May 15 10:38:12.139846 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu May 15 09:06:41 -00 2025 May 15 10:38:12.139869 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:38:12.139879 kernel: BIOS-provided physical RAM map: May 15 10:38:12.139884 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 15 10:38:12.139890 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 15 10:38:12.139895 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 15 10:38:12.139902 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 15 10:38:12.139908 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 15 10:38:12.139913 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 15 10:38:12.139920 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 15 10:38:12.139926 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 15 10:38:12.139931 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 15 10:38:12.139937 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 15 10:38:12.139942 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 15 10:38:12.139949 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 15 10:38:12.139957 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 15 10:38:12.139963 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 15 10:38:12.139969 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 15 10:38:12.139978 kernel: NX (Execute Disable) protection: active May 15 10:38:12.139984 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 15 10:38:12.139990 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 15 10:38:12.139996 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 15 10:38:12.140001 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 15 10:38:12.140007 kernel: extended physical RAM map: May 15 10:38:12.140013 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 15 10:38:12.140021 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 15 10:38:12.140044 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 15 10:38:12.140050 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 15 10:38:12.140056 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 15 10:38:12.140061 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 15 10:38:12.140067 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 15 10:38:12.140073 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 15 10:38:12.140079 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 15 10:38:12.140085 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 15 10:38:12.140091 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 15 10:38:12.140097 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 15 10:38:12.140104 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 15 10:38:12.140110 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 15 10:38:12.140116 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 15 10:38:12.140122 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 15 10:38:12.140130 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 15 10:38:12.140137 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 15 10:38:12.140143 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 15 10:38:12.140151 kernel: efi: EFI v2.70 by EDK II May 15 10:38:12.140158 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 15 10:38:12.140170 kernel: random: crng init done May 15 10:38:12.140176 kernel: SMBIOS 2.8 present. May 15 10:38:12.140183 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 15 10:38:12.140189 kernel: Hypervisor detected: KVM May 15 10:38:12.140195 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 15 10:38:12.140202 kernel: kvm-clock: cpu 0, msr 1719a001, primary cpu clock May 15 10:38:12.140208 kernel: kvm-clock: using sched offset of 5455245150 cycles May 15 10:38:12.140220 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 15 10:38:12.140226 kernel: tsc: Detected 2794.748 MHz processor May 15 10:38:12.140233 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 10:38:12.140240 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 10:38:12.140247 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 15 10:38:12.140253 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 10:38:12.140260 kernel: Using GB pages for direct mapping May 15 10:38:12.140266 kernel: Secure boot disabled May 15 10:38:12.140273 kernel: ACPI: Early table checksum verification disabled May 15 10:38:12.140281 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 15 10:38:12.140288 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 15 10:38:12.140295 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:12.140301 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:12.140312 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 15 10:38:12.140319 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:12.140340 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:12.140349 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:12.140356 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:12.140365 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 15 10:38:12.140372 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 15 10:38:12.140378 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 15 10:38:12.140385 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 15 10:38:12.140391 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 15 10:38:12.140398 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 15 10:38:12.140404 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 15 10:38:12.140411 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 15 10:38:12.140417 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 15 10:38:12.140425 kernel: No NUMA configuration found May 15 10:38:12.140432 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 15 10:38:12.140439 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 15 10:38:12.140445 kernel: Zone ranges: May 15 10:38:12.140452 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 10:38:12.140458 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 15 10:38:12.140465 kernel: Normal empty May 15 10:38:12.140471 kernel: Movable zone start for each node May 15 10:38:12.140478 kernel: Early memory node ranges May 15 10:38:12.140485 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 15 10:38:12.140492 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 15 10:38:12.140498 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 15 10:38:12.140505 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 15 10:38:12.140511 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 15 10:38:12.140518 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 15 10:38:12.140524 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 15 10:38:12.140531 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 10:38:12.140537 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 15 10:38:12.140544 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 15 10:38:12.140552 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 10:38:12.140558 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 15 10:38:12.140565 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 15 10:38:12.140571 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 15 10:38:12.140578 kernel: ACPI: PM-Timer IO Port: 0x608 May 15 10:38:12.140585 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 15 10:38:12.140591 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 15 10:38:12.140598 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 15 10:38:12.140604 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 15 10:38:12.140612 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 15 10:38:12.140618 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 15 10:38:12.140625 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 15 10:38:12.140634 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 10:38:12.140642 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 15 10:38:12.140649 kernel: TSC deadline timer available May 15 10:38:12.140656 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 15 10:38:12.140662 kernel: kvm-guest: KVM setup pv remote TLB flush May 15 10:38:12.140669 kernel: kvm-guest: setup PV sched yield May 15 10:38:12.140676 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 15 10:38:12.140683 kernel: Booting paravirtualized kernel on KVM May 15 10:38:12.140694 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 10:38:12.140702 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 15 10:38:12.140709 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 15 10:38:12.140716 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 15 10:38:12.140723 kernel: pcpu-alloc: [0] 0 1 2 3 May 15 10:38:12.140730 kernel: kvm-guest: setup async PF for cpu 0 May 15 10:38:12.140736 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 15 10:38:12.140743 kernel: kvm-guest: PV spinlocks enabled May 15 10:38:12.140750 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 15 10:38:12.140757 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 15 10:38:12.140765 kernel: Policy zone: DMA32 May 15 10:38:12.140773 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:38:12.140780 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 10:38:12.140787 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 10:38:12.140795 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 10:38:12.140802 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 10:38:12.140810 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 169308K reserved, 0K cma-reserved) May 15 10:38:12.140817 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 15 10:38:12.140823 kernel: ftrace: allocating 34585 entries in 136 pages May 15 10:38:12.140830 kernel: ftrace: allocated 136 pages with 2 groups May 15 10:38:12.140837 kernel: rcu: Hierarchical RCU implementation. May 15 10:38:12.140845 kernel: rcu: RCU event tracing is enabled. May 15 10:38:12.140853 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 15 10:38:12.140860 kernel: Rude variant of Tasks RCU enabled. May 15 10:38:12.140867 kernel: Tracing variant of Tasks RCU enabled. May 15 10:38:12.140874 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 10:38:12.140881 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 15 10:38:12.140888 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 15 10:38:12.140895 kernel: Console: colour dummy device 80x25 May 15 10:38:12.140902 kernel: printk: console [ttyS0] enabled May 15 10:38:12.140909 kernel: ACPI: Core revision 20210730 May 15 10:38:12.140916 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 15 10:38:12.140924 kernel: APIC: Switch to symmetric I/O mode setup May 15 10:38:12.140931 kernel: x2apic enabled May 15 10:38:12.140938 kernel: Switched APIC routing to physical x2apic. May 15 10:38:12.140944 kernel: kvm-guest: setup PV IPIs May 15 10:38:12.140951 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 10:38:12.140958 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 15 10:38:12.140965 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 15 10:38:12.140972 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 15 10:38:12.140981 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 15 10:38:12.140990 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 15 10:38:12.140997 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 10:38:12.141004 kernel: Spectre V2 : Mitigation: Retpolines May 15 10:38:12.141011 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 15 10:38:12.141018 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 15 10:38:12.141034 kernel: RETBleed: Mitigation: untrained return thunk May 15 10:38:12.141041 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 15 10:38:12.141051 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 15 10:38:12.141060 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 15 10:38:12.141067 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 15 10:38:12.141074 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 15 10:38:12.141081 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 15 10:38:12.141088 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 15 10:38:12.141095 kernel: Freeing SMP alternatives memory: 32K May 15 10:38:12.141102 kernel: pid_max: default: 32768 minimum: 301 May 15 10:38:12.141109 kernel: LSM: Security Framework initializing May 15 10:38:12.141116 kernel: SELinux: Initializing. May 15 10:38:12.141124 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:38:12.141131 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:38:12.141138 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 15 10:38:12.141145 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 15 10:38:12.141152 kernel: ... version: 0 May 15 10:38:12.141158 kernel: ... bit width: 48 May 15 10:38:12.141172 kernel: ... generic registers: 6 May 15 10:38:12.141181 kernel: ... value mask: 0000ffffffffffff May 15 10:38:12.141190 kernel: ... max period: 00007fffffffffff May 15 10:38:12.141201 kernel: ... fixed-purpose events: 0 May 15 10:38:12.141210 kernel: ... event mask: 000000000000003f May 15 10:38:12.141219 kernel: signal: max sigframe size: 1776 May 15 10:38:12.141226 kernel: rcu: Hierarchical SRCU implementation. May 15 10:38:12.141233 kernel: smp: Bringing up secondary CPUs ... May 15 10:38:12.141240 kernel: x86: Booting SMP configuration: May 15 10:38:12.141247 kernel: .... node #0, CPUs: #1 May 15 10:38:12.141253 kernel: kvm-clock: cpu 1, msr 1719a041, secondary cpu clock May 15 10:38:12.141260 kernel: kvm-guest: setup async PF for cpu 1 May 15 10:38:12.141267 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 15 10:38:12.141275 kernel: #2 May 15 10:38:12.141282 kernel: kvm-clock: cpu 2, msr 1719a081, secondary cpu clock May 15 10:38:12.141289 kernel: kvm-guest: setup async PF for cpu 2 May 15 10:38:12.141296 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 15 10:38:12.141303 kernel: #3 May 15 10:38:12.141309 kernel: kvm-clock: cpu 3, msr 1719a0c1, secondary cpu clock May 15 10:38:12.141316 kernel: kvm-guest: setup async PF for cpu 3 May 15 10:38:12.141323 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 15 10:38:12.141330 kernel: smp: Brought up 1 node, 4 CPUs May 15 10:38:12.141342 kernel: smpboot: Max logical packages: 1 May 15 10:38:12.141349 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 15 10:38:12.141356 kernel: devtmpfs: initialized May 15 10:38:12.141362 kernel: x86/mm: Memory block size: 128MB May 15 10:38:12.141369 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 15 10:38:12.141376 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 15 10:38:12.141384 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 15 10:38:12.141390 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 15 10:38:12.141397 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 15 10:38:12.141406 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 10:38:12.141413 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 15 10:38:12.141419 kernel: pinctrl core: initialized pinctrl subsystem May 15 10:38:12.141426 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 10:38:12.141433 kernel: audit: initializing netlink subsys (disabled) May 15 10:38:12.141440 kernel: audit: type=2000 audit(1747305491.431:1): state=initialized audit_enabled=0 res=1 May 15 10:38:12.141447 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 10:38:12.141454 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 10:38:12.141461 kernel: cpuidle: using governor menu May 15 10:38:12.141468 kernel: ACPI: bus type PCI registered May 15 10:38:12.141475 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 10:38:12.141482 kernel: dca service started, version 1.12.1 May 15 10:38:12.141489 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 15 10:38:12.141496 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 15 10:38:12.141503 kernel: PCI: Using configuration type 1 for base access May 15 10:38:12.141510 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 10:38:12.141517 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 10:38:12.141524 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 10:38:12.141532 kernel: ACPI: Added _OSI(Module Device) May 15 10:38:12.141539 kernel: ACPI: Added _OSI(Processor Device) May 15 10:38:12.141546 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 10:38:12.141553 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 10:38:12.141559 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 10:38:12.141566 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 10:38:12.141573 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 10:38:12.141580 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 10:38:12.141587 kernel: ACPI: Interpreter enabled May 15 10:38:12.141595 kernel: ACPI: PM: (supports S0 S3 S5) May 15 10:38:12.141601 kernel: ACPI: Using IOAPIC for interrupt routing May 15 10:38:12.141608 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 10:38:12.141615 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 15 10:38:12.141622 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 10:38:12.141777 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 10:38:12.141856 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 15 10:38:12.141933 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 15 10:38:12.141942 kernel: PCI host bridge to bus 0000:00 May 15 10:38:12.142046 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 10:38:12.142149 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 15 10:38:12.142232 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 10:38:12.142319 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 15 10:38:12.142390 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 10:38:12.142458 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 15 10:38:12.142535 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 10:38:12.142638 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 15 10:38:12.142729 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 15 10:38:12.142806 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 15 10:38:12.142881 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 15 10:38:12.142955 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 15 10:38:12.143112 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 15 10:38:12.143222 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 10:38:12.143312 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 15 10:38:12.145470 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 15 10:38:12.145591 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 15 10:38:12.145669 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 15 10:38:12.145774 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 15 10:38:12.145855 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 15 10:38:12.145928 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 15 10:38:12.146047 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 15 10:38:12.146151 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 15 10:38:12.146241 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 15 10:38:12.146316 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 15 10:38:12.146395 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 15 10:38:12.146469 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 15 10:38:12.146554 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 15 10:38:12.146628 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 15 10:38:12.146716 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 15 10:38:12.146790 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 15 10:38:12.146862 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 15 10:38:12.146954 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 15 10:38:12.147042 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 15 10:38:12.147056 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 15 10:38:12.147065 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 15 10:38:12.147075 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 10:38:12.147084 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 15 10:38:12.147093 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 15 10:38:12.147103 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 15 10:38:12.147114 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 15 10:38:12.147121 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 15 10:38:12.147128 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 15 10:38:12.147134 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 15 10:38:12.147141 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 15 10:38:12.147148 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 15 10:38:12.147155 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 15 10:38:12.147170 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 15 10:38:12.147177 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 15 10:38:12.147185 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 15 10:38:12.147192 kernel: iommu: Default domain type: Translated May 15 10:38:12.147200 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 10:38:12.147283 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 15 10:38:12.147365 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 10:38:12.147440 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 15 10:38:12.147450 kernel: vgaarb: loaded May 15 10:38:12.147457 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 10:38:12.147464 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 10:38:12.147474 kernel: PTP clock support registered May 15 10:38:12.147481 kernel: Registered efivars operations May 15 10:38:12.147488 kernel: PCI: Using ACPI for IRQ routing May 15 10:38:12.147495 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 10:38:12.147501 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 15 10:38:12.147508 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 15 10:38:12.147515 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 15 10:38:12.147522 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 15 10:38:12.147528 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 15 10:38:12.147536 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 15 10:38:12.147543 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 15 10:38:12.147550 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 15 10:38:12.147557 kernel: clocksource: Switched to clocksource kvm-clock May 15 10:38:12.147564 kernel: VFS: Disk quotas dquot_6.6.0 May 15 10:38:12.147571 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 10:38:12.147578 kernel: pnp: PnP ACPI init May 15 10:38:12.147677 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 15 10:38:12.147691 kernel: pnp: PnP ACPI: found 6 devices May 15 10:38:12.147698 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 10:38:12.147705 kernel: NET: Registered PF_INET protocol family May 15 10:38:12.147712 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 10:38:12.147719 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 10:38:12.147726 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 10:38:12.147733 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 10:38:12.147740 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 10:38:12.147747 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 10:38:12.147755 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:38:12.147762 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:38:12.147769 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 10:38:12.147776 kernel: NET: Registered PF_XDP protocol family May 15 10:38:12.147854 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 15 10:38:12.147930 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 15 10:38:12.148000 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 15 10:38:12.148086 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 15 10:38:12.148166 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 15 10:38:12.148235 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 15 10:38:12.148301 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 15 10:38:12.148368 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 15 10:38:12.148378 kernel: PCI: CLS 0 bytes, default 64 May 15 10:38:12.148385 kernel: Initialise system trusted keyrings May 15 10:38:12.148392 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 10:38:12.148399 kernel: Key type asymmetric registered May 15 10:38:12.148408 kernel: Asymmetric key parser 'x509' registered May 15 10:38:12.148415 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 10:38:12.148422 kernel: io scheduler mq-deadline registered May 15 10:38:12.148438 kernel: io scheduler kyber registered May 15 10:38:12.148446 kernel: io scheduler bfq registered May 15 10:38:12.148453 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 10:38:12.148461 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 15 10:38:12.148468 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 15 10:38:12.148476 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 15 10:38:12.148484 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 10:38:12.148492 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 10:38:12.148499 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 15 10:38:12.148506 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 10:38:12.148513 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 10:38:12.148607 kernel: rtc_cmos 00:04: RTC can wake from S4 May 15 10:38:12.148618 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 10:38:12.148689 kernel: rtc_cmos 00:04: registered as rtc0 May 15 10:38:12.148762 kernel: rtc_cmos 00:04: setting system clock to 2025-05-15T10:38:11 UTC (1747305491) May 15 10:38:12.148830 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 15 10:38:12.148840 kernel: efifb: probing for efifb May 15 10:38:12.148848 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 15 10:38:12.148855 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 15 10:38:12.148862 kernel: efifb: scrolling: redraw May 15 10:38:12.148870 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 15 10:38:12.148877 kernel: Console: switching to colour frame buffer device 160x50 May 15 10:38:12.148884 kernel: fb0: EFI VGA frame buffer device May 15 10:38:12.148893 kernel: pstore: Registered efi as persistent store backend May 15 10:38:12.148900 kernel: NET: Registered PF_INET6 protocol family May 15 10:38:12.148908 kernel: Segment Routing with IPv6 May 15 10:38:12.148915 kernel: In-situ OAM (IOAM) with IPv6 May 15 10:38:12.148924 kernel: NET: Registered PF_PACKET protocol family May 15 10:38:12.148931 kernel: Key type dns_resolver registered May 15 10:38:12.148939 kernel: IPI shorthand broadcast: enabled May 15 10:38:12.148947 kernel: sched_clock: Marking stable (452466972, 127248094)->(730553159, -150838093) May 15 10:38:12.148954 kernel: registered taskstats version 1 May 15 10:38:12.148961 kernel: Loading compiled-in X.509 certificates May 15 10:38:12.148968 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 04007c306af6b7696d09b3c2eafc1297036fd28e' May 15 10:38:12.148976 kernel: Key type .fscrypt registered May 15 10:38:12.148983 kernel: Key type fscrypt-provisioning registered May 15 10:38:12.148990 kernel: pstore: Using crash dump compression: deflate May 15 10:38:12.148998 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 10:38:12.149006 kernel: ima: Allocated hash algorithm: sha1 May 15 10:38:12.149013 kernel: ima: No architecture policies found May 15 10:38:12.149020 kernel: clk: Disabling unused clocks May 15 10:38:12.149040 kernel: Freeing unused kernel image (initmem) memory: 47472K May 15 10:38:12.149047 kernel: Write protecting the kernel read-only data: 28672k May 15 10:38:12.149054 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 10:38:12.149062 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 10:38:12.149069 kernel: Run /init as init process May 15 10:38:12.149076 kernel: with arguments: May 15 10:38:12.149085 kernel: /init May 15 10:38:12.149092 kernel: with environment: May 15 10:38:12.149099 kernel: HOME=/ May 15 10:38:12.149106 kernel: TERM=linux May 15 10:38:12.149113 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 10:38:12.149126 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:38:12.149135 systemd[1]: Detected virtualization kvm. May 15 10:38:12.149143 systemd[1]: Detected architecture x86-64. May 15 10:38:12.149152 systemd[1]: Running in initrd. May 15 10:38:12.149167 systemd[1]: No hostname configured, using default hostname. May 15 10:38:12.149175 systemd[1]: Hostname set to . May 15 10:38:12.149183 systemd[1]: Initializing machine ID from VM UUID. May 15 10:38:12.149190 systemd[1]: Queued start job for default target initrd.target. May 15 10:38:12.149198 systemd[1]: Started systemd-ask-password-console.path. May 15 10:38:12.149206 systemd[1]: Reached target cryptsetup.target. May 15 10:38:12.149214 systemd[1]: Reached target paths.target. May 15 10:38:12.149223 systemd[1]: Reached target slices.target. May 15 10:38:12.149231 systemd[1]: Reached target swap.target. May 15 10:38:12.149239 systemd[1]: Reached target timers.target. May 15 10:38:12.149247 systemd[1]: Listening on iscsid.socket. May 15 10:38:12.149254 systemd[1]: Listening on iscsiuio.socket. May 15 10:38:12.149262 systemd[1]: Listening on systemd-journald-audit.socket. May 15 10:38:12.149270 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 10:38:12.149279 systemd[1]: Listening on systemd-journald.socket. May 15 10:38:12.149286 systemd[1]: Listening on systemd-networkd.socket. May 15 10:38:12.149294 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:38:12.149301 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:38:12.149309 systemd[1]: Reached target sockets.target. May 15 10:38:12.149317 systemd[1]: Starting kmod-static-nodes.service... May 15 10:38:12.149324 systemd[1]: Finished network-cleanup.service. May 15 10:38:12.149332 systemd[1]: Starting systemd-fsck-usr.service... May 15 10:38:12.149339 systemd[1]: Starting systemd-journald.service... May 15 10:38:12.149349 systemd[1]: Starting systemd-modules-load.service... May 15 10:38:12.149356 systemd[1]: Starting systemd-resolved.service... May 15 10:38:12.149364 systemd[1]: Starting systemd-vconsole-setup.service... May 15 10:38:12.149372 systemd[1]: Finished kmod-static-nodes.service. May 15 10:38:12.149379 systemd[1]: Finished systemd-fsck-usr.service. May 15 10:38:12.149387 kernel: audit: type=1130 audit(1747305492.139:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.149395 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:38:12.149402 systemd[1]: Finished systemd-vconsole-setup.service. May 15 10:38:12.149410 kernel: audit: type=1130 audit(1747305492.147:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.149422 systemd-journald[199]: Journal started May 15 10:38:12.149461 systemd-journald[199]: Runtime Journal (/run/log/journal/feaa0f12438e4d1da291bf59a45e14ed) is 6.0M, max 48.4M, 42.4M free. May 15 10:38:12.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.144949 systemd-modules-load[200]: Inserted module 'overlay' May 15 10:38:12.155492 systemd[1]: Started systemd-journald.service. May 15 10:38:12.155508 kernel: audit: type=1130 audit(1747305492.151:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.151560 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:38:12.160233 kernel: audit: type=1130 audit(1747305492.155:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.156607 systemd[1]: Starting dracut-cmdline-ask.service... May 15 10:38:12.172764 systemd[1]: Finished dracut-cmdline-ask.service. May 15 10:38:12.177997 kernel: audit: type=1130 audit(1747305492.173:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.174290 systemd[1]: Starting dracut-cmdline.service... May 15 10:38:12.183567 systemd-resolved[201]: Positive Trust Anchors: May 15 10:38:12.183582 systemd-resolved[201]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:38:12.183611 systemd-resolved[201]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:38:12.193140 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 10:38:12.186226 systemd-resolved[201]: Defaulting to hostname 'linux'. May 15 10:38:12.197464 kernel: audit: type=1130 audit(1747305492.193:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.187146 systemd[1]: Started systemd-resolved.service. May 15 10:38:12.199526 kernel: Bridge firewalling registered May 15 10:38:12.193579 systemd[1]: Reached target nss-lookup.target. May 15 10:38:12.199535 systemd-modules-load[200]: Inserted module 'br_netfilter' May 15 10:38:12.202166 dracut-cmdline[217]: dracut-dracut-053 May 15 10:38:12.204813 dracut-cmdline[217]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:38:12.219059 kernel: SCSI subsystem initialized May 15 10:38:12.231074 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 10:38:12.231115 kernel: device-mapper: uevent: version 1.0.3 May 15 10:38:12.231126 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 10:38:12.233749 systemd-modules-load[200]: Inserted module 'dm_multipath' May 15 10:38:12.234444 systemd[1]: Finished systemd-modules-load.service. May 15 10:38:12.239152 kernel: audit: type=1130 audit(1747305492.235:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.238312 systemd[1]: Starting systemd-sysctl.service... May 15 10:38:12.245533 systemd[1]: Finished systemd-sysctl.service. May 15 10:38:12.249908 kernel: audit: type=1130 audit(1747305492.245:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.276053 kernel: Loading iSCSI transport class v2.0-870. May 15 10:38:12.292055 kernel: iscsi: registered transport (tcp) May 15 10:38:12.313055 kernel: iscsi: registered transport (qla4xxx) May 15 10:38:12.313079 kernel: QLogic iSCSI HBA Driver May 15 10:38:12.344775 systemd[1]: Finished dracut-cmdline.service. May 15 10:38:12.349081 kernel: audit: type=1130 audit(1747305492.345:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.346211 systemd[1]: Starting dracut-pre-udev.service... May 15 10:38:12.393058 kernel: raid6: avx2x4 gen() 28313 MB/s May 15 10:38:12.410055 kernel: raid6: avx2x4 xor() 7275 MB/s May 15 10:38:12.427050 kernel: raid6: avx2x2 gen() 31321 MB/s May 15 10:38:12.444048 kernel: raid6: avx2x2 xor() 18459 MB/s May 15 10:38:12.461045 kernel: raid6: avx2x1 gen() 26557 MB/s May 15 10:38:12.478045 kernel: raid6: avx2x1 xor() 15326 MB/s May 15 10:38:12.495048 kernel: raid6: sse2x4 gen() 14830 MB/s May 15 10:38:12.512049 kernel: raid6: sse2x4 xor() 7679 MB/s May 15 10:38:12.529049 kernel: raid6: sse2x2 gen() 16283 MB/s May 15 10:38:12.546045 kernel: raid6: sse2x2 xor() 9843 MB/s May 15 10:38:12.563050 kernel: raid6: sse2x1 gen() 12489 MB/s May 15 10:38:12.580456 kernel: raid6: sse2x1 xor() 7790 MB/s May 15 10:38:12.580473 kernel: raid6: using algorithm avx2x2 gen() 31321 MB/s May 15 10:38:12.580482 kernel: raid6: .... xor() 18459 MB/s, rmw enabled May 15 10:38:12.581188 kernel: raid6: using avx2x2 recovery algorithm May 15 10:38:12.593079 kernel: xor: automatically using best checksumming function avx May 15 10:38:12.682064 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 10:38:12.692095 systemd[1]: Finished dracut-pre-udev.service. May 15 10:38:12.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.693000 audit: BPF prog-id=7 op=LOAD May 15 10:38:12.693000 audit: BPF prog-id=8 op=LOAD May 15 10:38:12.694539 systemd[1]: Starting systemd-udevd.service... May 15 10:38:12.706986 systemd-udevd[401]: Using default interface naming scheme 'v252'. May 15 10:38:12.711067 systemd[1]: Started systemd-udevd.service. May 15 10:38:12.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.712364 systemd[1]: Starting dracut-pre-trigger.service... May 15 10:38:12.725536 dracut-pre-trigger[407]: rd.md=0: removing MD RAID activation May 15 10:38:12.754919 systemd[1]: Finished dracut-pre-trigger.service. May 15 10:38:12.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.756169 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:38:12.798276 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:38:12.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:12.822056 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 15 10:38:12.829836 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 10:38:12.829850 kernel: GPT:9289727 != 19775487 May 15 10:38:12.829863 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 10:38:12.829872 kernel: GPT:9289727 != 19775487 May 15 10:38:12.829880 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 10:38:12.829889 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:38:12.834059 kernel: libata version 3.00 loaded. May 15 10:38:12.837069 kernel: cryptd: max_cpu_qlen set to 1000 May 15 10:38:12.844486 kernel: ahci 0000:00:1f.2: version 3.0 May 15 10:38:12.864567 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 15 10:38:12.864585 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 15 10:38:12.864688 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 15 10:38:12.864770 kernel: AVX2 version of gcm_enc/dec engaged. May 15 10:38:12.864780 kernel: AES CTR mode by8 optimization enabled May 15 10:38:12.864788 kernel: scsi host0: ahci May 15 10:38:12.864884 kernel: scsi host1: ahci May 15 10:38:12.864992 kernel: scsi host2: ahci May 15 10:38:12.865122 kernel: scsi host3: ahci May 15 10:38:12.865222 kernel: scsi host4: ahci May 15 10:38:12.865312 kernel: scsi host5: ahci May 15 10:38:12.865401 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 May 15 10:38:12.865410 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 May 15 10:38:12.865419 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 May 15 10:38:12.865428 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 May 15 10:38:12.865437 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 May 15 10:38:12.865449 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 May 15 10:38:12.878045 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (450) May 15 10:38:12.881412 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 10:38:12.884664 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 10:38:12.889661 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 10:38:12.889935 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 10:38:12.895306 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:38:12.896344 systemd[1]: Starting disk-uuid.service... May 15 10:38:12.903250 disk-uuid[535]: Primary Header is updated. May 15 10:38:12.903250 disk-uuid[535]: Secondary Entries is updated. May 15 10:38:12.903250 disk-uuid[535]: Secondary Header is updated. May 15 10:38:12.906738 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:38:13.170086 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 15 10:38:13.170190 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 15 10:38:13.178056 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 15 10:38:13.178127 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 15 10:38:13.179259 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 15 10:38:13.180048 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 15 10:38:13.181057 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 15 10:38:13.182594 kernel: ata3.00: applying bridge limits May 15 10:38:13.183517 kernel: ata3.00: configured for UDMA/100 May 15 10:38:13.184055 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 15 10:38:13.216067 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 15 10:38:13.233738 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 15 10:38:13.233756 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 15 10:38:13.916061 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:38:13.916202 disk-uuid[536]: The operation has completed successfully. May 15 10:38:13.936525 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 10:38:13.936627 systemd[1]: Finished disk-uuid.service. May 15 10:38:13.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:13.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:13.946010 systemd[1]: Starting verity-setup.service... May 15 10:38:13.962059 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 15 10:38:13.981335 systemd[1]: Found device dev-mapper-usr.device. May 15 10:38:13.982995 systemd[1]: Mounting sysusr-usr.mount... May 15 10:38:13.984850 systemd[1]: Finished verity-setup.service. May 15 10:38:13.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:14.048603 systemd[1]: Mounted sysusr-usr.mount. May 15 10:38:14.050088 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 10:38:14.049327 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 10:38:14.049883 systemd[1]: Starting ignition-setup.service... May 15 10:38:14.052234 systemd[1]: Starting parse-ip-for-networkd.service... May 15 10:38:14.062646 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 10:38:14.062676 kernel: BTRFS info (device vda6): using free space tree May 15 10:38:14.062687 kernel: BTRFS info (device vda6): has skinny extents May 15 10:38:14.072081 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 10:38:14.079979 systemd[1]: Finished ignition-setup.service. May 15 10:38:14.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:14.081641 systemd[1]: Starting ignition-fetch-offline.service... May 15 10:38:14.131274 systemd[1]: Finished parse-ip-for-networkd.service. May 15 10:38:14.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:14.132000 audit: BPF prog-id=9 op=LOAD May 15 10:38:14.133577 systemd[1]: Starting systemd-networkd.service... May 15 10:38:14.158086 systemd-networkd[727]: lo: Link UP May 15 10:38:14.158098 systemd-networkd[727]: lo: Gained carrier May 15 10:38:14.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:14.158627 systemd-networkd[727]: Enumeration completed May 15 10:38:14.158745 systemd[1]: Started systemd-networkd.service. May 15 10:38:14.158885 systemd-networkd[727]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:38:14.160426 systemd[1]: Reached target network.target. May 15 10:38:14.160654 systemd-networkd[727]: eth0: Link UP May 15 10:38:14.160658 systemd-networkd[727]: eth0: Gained carrier May 15 10:38:14.162940 systemd[1]: Starting iscsiuio.service... May 15 10:38:14.195751 systemd[1]: Started iscsiuio.service. May 15 10:38:14.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:14.197229 systemd[1]: Starting iscsid.service... May 15 10:38:14.199112 systemd-networkd[727]: eth0: DHCPv4 address 10.0.0.52/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:38:14.203838 ignition[656]: Ignition 2.14.0 May 15 10:38:14.203848 ignition[656]: Stage: fetch-offline May 15 10:38:14.203927 ignition[656]: no configs at "/usr/lib/ignition/base.d" May 15 10:38:14.203937 ignition[656]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:14.204078 ignition[656]: parsed url from cmdline: "" May 15 10:38:14.204081 ignition[656]: no config URL provided May 15 10:38:14.204087 ignition[656]: reading system config file "/usr/lib/ignition/user.ign" May 15 10:38:14.213304 iscsid[732]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 10:38:14.213304 iscsid[732]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 10:38:14.213304 iscsid[732]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 10:38:14.213304 iscsid[732]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 10:38:14.213304 iscsid[732]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 10:38:14.213304 iscsid[732]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 10:38:14.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:14.204095 ignition[656]: no config at "/usr/lib/ignition/user.ign" May 15 10:38:14.213371 systemd[1]: Started iscsid.service. May 15 10:38:14.204145 ignition[656]: op(1): [started] loading QEMU firmware config module May 15 10:38:14.204150 ignition[656]: op(1): executing: "modprobe" "qemu_fw_cfg" May 15 10:38:14.208443 ignition[656]: op(1): [finished] loading QEMU firmware config module May 15 10:38:14.231258 systemd[1]: Starting dracut-initqueue.service... May 15 10:38:14.242068 systemd[1]: Finished dracut-initqueue.service. May 15 10:38:14.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:14.243393 systemd[1]: Reached target remote-fs-pre.target. May 15 10:38:14.245092 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:38:14.246105 systemd[1]: Reached target remote-fs.target. May 15 10:38:14.247376 systemd[1]: Starting dracut-pre-mount.service... May 15 10:38:14.255797 systemd[1]: Finished dracut-pre-mount.service. May 15 10:38:14.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:14.274070 ignition[656]: parsing config with SHA512: cd8c39868b8014651f8d0b9de759b0995e842db300004955f4661a2453628009af6327927a2e8f8832da10d9277171154405c7e53f3413e41d3245cc7bb02ef4 May 15 10:38:14.280223 unknown[656]: fetched base config from "system" May 15 10:38:14.280233 unknown[656]: fetched user config from "qemu" May 15 10:38:14.281475 ignition[656]: fetch-offline: fetch-offline passed May 15 10:38:14.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:14.282510 systemd[1]: Finished ignition-fetch-offline.service. May 15 10:38:14.281529 ignition[656]: Ignition finished successfully May 15 10:38:14.283557 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 10:38:14.284458 systemd[1]: Starting ignition-kargs.service... May 15 10:38:14.293350 ignition[749]: Ignition 2.14.0 May 15 10:38:14.293361 ignition[749]: Stage: kargs May 15 10:38:14.293458 ignition[749]: no configs at "/usr/lib/ignition/base.d" May 15 10:38:14.293469 ignition[749]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:14.295770 systemd[1]: Finished ignition-kargs.service. May 15 10:38:14.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:14.294367 ignition[749]: kargs: kargs passed May 15 10:38:14.298362 systemd[1]: Starting ignition-disks.service... May 15 10:38:14.294408 ignition[749]: Ignition finished successfully May 15 10:38:14.305054 ignition[755]: Ignition 2.14.0 May 15 10:38:14.305064 ignition[755]: Stage: disks May 15 10:38:14.305170 ignition[755]: no configs at "/usr/lib/ignition/base.d" May 15 10:38:14.305181 ignition[755]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:14.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:14.306709 systemd[1]: Finished ignition-disks.service. May 15 10:38:14.306109 ignition[755]: disks: disks passed May 15 10:38:14.308229 systemd[1]: Reached target initrd-root-device.target. May 15 10:38:14.306154 ignition[755]: Ignition finished successfully May 15 10:38:14.310044 systemd[1]: Reached target local-fs-pre.target. May 15 10:38:14.310892 systemd[1]: Reached target local-fs.target. May 15 10:38:14.312413 systemd[1]: Reached target sysinit.target. May 15 10:38:14.312813 systemd[1]: Reached target basic.target. May 15 10:38:14.313831 systemd[1]: Starting systemd-fsck-root.service... May 15 10:38:14.324828 systemd-fsck[763]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 15 10:38:14.329870 systemd[1]: Finished systemd-fsck-root.service. May 15 10:38:14.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:14.331063 systemd[1]: Mounting sysroot.mount... May 15 10:38:14.338045 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 10:38:14.338350 systemd[1]: Mounted sysroot.mount. May 15 10:38:14.338647 systemd[1]: Reached target initrd-root-fs.target. May 15 10:38:14.341288 systemd[1]: Mounting sysroot-usr.mount... May 15 10:38:14.342902 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 10:38:14.342938 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 10:38:14.342958 systemd[1]: Reached target ignition-diskful.target. May 15 10:38:14.345816 systemd[1]: Mounted sysroot-usr.mount. May 15 10:38:14.348355 systemd[1]: Starting initrd-setup-root.service... May 15 10:38:14.355506 initrd-setup-root[773]: cut: /sysroot/etc/passwd: No such file or directory May 15 10:38:14.359189 initrd-setup-root[781]: cut: /sysroot/etc/group: No such file or directory May 15 10:38:14.363459 initrd-setup-root[789]: cut: /sysroot/etc/shadow: No such file or directory May 15 10:38:14.366650 initrd-setup-root[797]: cut: /sysroot/etc/gshadow: No such file or directory May 15 10:38:14.393006 systemd[1]: Finished initrd-setup-root.service. May 15 10:38:14.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:14.394618 systemd[1]: Starting ignition-mount.service... May 15 10:38:14.395635 systemd[1]: Starting sysroot-boot.service... May 15 10:38:14.402064 bash[815]: umount: /sysroot/usr/share/oem: not mounted. May 15 10:38:14.410018 ignition[816]: INFO : Ignition 2.14.0 May 15 10:38:14.410018 ignition[816]: INFO : Stage: mount May 15 10:38:14.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:14.411046 systemd[1]: Finished sysroot-boot.service. May 15 10:38:14.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:14.415142 ignition[816]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:38:14.415142 ignition[816]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:14.415142 ignition[816]: INFO : mount: mount passed May 15 10:38:14.415142 ignition[816]: INFO : Ignition finished successfully May 15 10:38:14.413541 systemd[1]: Finished ignition-mount.service. May 15 10:38:14.992054 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 10:38:15.000050 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (826) May 15 10:38:15.000098 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 10:38:15.001427 kernel: BTRFS info (device vda6): using free space tree May 15 10:38:15.001441 kernel: BTRFS info (device vda6): has skinny extents May 15 10:38:15.005567 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 10:38:15.007914 systemd[1]: Starting ignition-files.service... May 15 10:38:15.021508 ignition[846]: INFO : Ignition 2.14.0 May 15 10:38:15.021508 ignition[846]: INFO : Stage: files May 15 10:38:15.023145 ignition[846]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:38:15.023145 ignition[846]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:15.023145 ignition[846]: DEBUG : files: compiled without relabeling support, skipping May 15 10:38:15.026760 ignition[846]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 10:38:15.026760 ignition[846]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 10:38:15.026760 ignition[846]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 10:38:15.026760 ignition[846]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 10:38:15.026760 ignition[846]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 10:38:15.026760 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 15 10:38:15.026760 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 May 15 10:38:15.025857 unknown[846]: wrote ssh authorized keys file for user: core May 15 10:38:15.064811 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 15 10:38:15.139263 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 15 10:38:15.141365 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 15 10:38:15.141365 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 15 10:38:15.141365 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 15 10:38:15.141365 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 15 10:38:15.141365 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:38:15.141365 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:38:15.141365 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:38:15.141365 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:38:15.141365 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:38:15.141365 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:38:15.141365 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 10:38:15.141365 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 10:38:15.141365 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 10:38:15.141365 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 May 15 10:38:15.637087 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 15 10:38:15.947228 systemd-networkd[727]: eth0: Gained IPv6LL May 15 10:38:16.033609 ignition[846]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 10:38:16.033609 ignition[846]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 15 10:38:16.033609 ignition[846]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:38:16.040044 ignition[846]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:38:16.040044 ignition[846]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 15 10:38:16.040044 ignition[846]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 15 10:38:16.040044 ignition[846]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:38:16.040044 ignition[846]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:38:16.040044 ignition[846]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 15 10:38:16.040044 ignition[846]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 15 10:38:16.040044 ignition[846]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 15 10:38:16.040044 ignition[846]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 15 10:38:16.040044 ignition[846]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:38:16.067767 ignition[846]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:38:16.069416 ignition[846]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 15 10:38:16.069416 ignition[846]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 10:38:16.069416 ignition[846]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 10:38:16.069416 ignition[846]: INFO : files: files passed May 15 10:38:16.069416 ignition[846]: INFO : Ignition finished successfully May 15 10:38:16.077307 systemd[1]: Finished ignition-files.service. May 15 10:38:16.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.078516 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 10:38:16.079515 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 10:38:16.080200 systemd[1]: Starting ignition-quench.service... May 15 10:38:16.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.082512 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 10:38:16.082612 systemd[1]: Finished ignition-quench.service. May 15 10:38:16.089596 initrd-setup-root-after-ignition[872]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 15 10:38:16.091178 initrd-setup-root-after-ignition[874]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 10:38:16.091727 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 10:38:16.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.093056 systemd[1]: Reached target ignition-complete.target. May 15 10:38:16.095570 systemd[1]: Starting initrd-parse-etc.service... May 15 10:38:16.106693 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 10:38:16.106775 systemd[1]: Finished initrd-parse-etc.service. May 15 10:38:16.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.108518 systemd[1]: Reached target initrd-fs.target. May 15 10:38:16.109899 systemd[1]: Reached target initrd.target. May 15 10:38:16.110331 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 10:38:16.110987 systemd[1]: Starting dracut-pre-pivot.service... May 15 10:38:16.120635 systemd[1]: Finished dracut-pre-pivot.service. May 15 10:38:16.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.121557 systemd[1]: Starting initrd-cleanup.service... May 15 10:38:16.129141 systemd[1]: Stopped target nss-lookup.target. May 15 10:38:16.129458 systemd[1]: Stopped target remote-cryptsetup.target. May 15 10:38:16.130985 systemd[1]: Stopped target timers.target. May 15 10:38:16.132726 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 10:38:16.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.132819 systemd[1]: Stopped dracut-pre-pivot.service. May 15 10:38:16.133998 systemd[1]: Stopped target initrd.target. May 15 10:38:16.135726 systemd[1]: Stopped target basic.target. May 15 10:38:16.137131 systemd[1]: Stopped target ignition-complete.target. May 15 10:38:16.139584 systemd[1]: Stopped target ignition-diskful.target. May 15 10:38:16.140321 systemd[1]: Stopped target initrd-root-device.target. May 15 10:38:16.140644 systemd[1]: Stopped target remote-fs.target. May 15 10:38:16.140975 systemd[1]: Stopped target remote-fs-pre.target. May 15 10:38:16.146256 systemd[1]: Stopped target sysinit.target. May 15 10:38:16.146559 systemd[1]: Stopped target local-fs.target. May 15 10:38:16.148294 systemd[1]: Stopped target local-fs-pre.target. May 15 10:38:16.149524 systemd[1]: Stopped target swap.target. May 15 10:38:16.150971 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 10:38:16.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.151077 systemd[1]: Stopped dracut-pre-mount.service. May 15 10:38:16.152388 systemd[1]: Stopped target cryptsetup.target. May 15 10:38:16.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.153936 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 10:38:16.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.154041 systemd[1]: Stopped dracut-initqueue.service. May 15 10:38:16.155584 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 10:38:16.155669 systemd[1]: Stopped ignition-fetch-offline.service. May 15 10:38:16.157122 systemd[1]: Stopped target paths.target. May 15 10:38:16.158722 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 10:38:16.163384 systemd[1]: Stopped systemd-ask-password-console.path. May 15 10:38:16.165206 systemd[1]: Stopped target slices.target. May 15 10:38:16.165741 systemd[1]: Stopped target sockets.target. May 15 10:38:16.167144 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 10:38:16.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.167253 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 10:38:16.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.168504 systemd[1]: ignition-files.service: Deactivated successfully. May 15 10:38:16.168592 systemd[1]: Stopped ignition-files.service. May 15 10:38:16.171727 systemd[1]: Stopping ignition-mount.service... May 15 10:38:16.175231 iscsid[732]: iscsid shutting down. May 15 10:38:16.172528 systemd[1]: Stopping iscsid.service... May 15 10:38:16.175246 systemd[1]: Stopping sysroot-boot.service... May 15 10:38:16.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.175516 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 10:38:16.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.175644 systemd[1]: Stopped systemd-udev-trigger.service. May 15 10:38:16.177788 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 10:38:16.177909 systemd[1]: Stopped dracut-pre-trigger.service. May 15 10:38:16.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.181281 systemd[1]: iscsid.service: Deactivated successfully. May 15 10:38:16.181378 systemd[1]: Stopped iscsid.service. May 15 10:38:16.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.184052 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 10:38:16.184140 systemd[1]: Finished initrd-cleanup.service. May 15 10:38:16.186129 systemd[1]: iscsid.socket: Deactivated successfully. May 15 10:38:16.186157 systemd[1]: Closed iscsid.socket. May 15 10:38:16.186748 systemd[1]: Stopping iscsiuio.service... May 15 10:38:16.192219 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 10:38:16.193490 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 10:38:16.194410 systemd[1]: Stopped iscsiuio.service. May 15 10:38:16.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.196144 ignition[887]: INFO : Ignition 2.14.0 May 15 10:38:16.196144 ignition[887]: INFO : Stage: umount May 15 10:38:16.196144 ignition[887]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:38:16.196144 ignition[887]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:16.208730 kernel: kauditd_printk_skb: 42 callbacks suppressed May 15 10:38:16.208762 kernel: audit: type=1131 audit(1747305496.195:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.208781 kernel: audit: type=1131 audit(1747305496.202:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.208793 kernel: audit: type=1131 audit(1747305496.206:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.197174 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 10:38:16.213146 kernel: audit: type=1131 audit(1747305496.211:56): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.213187 ignition[887]: INFO : umount: umount passed May 15 10:38:16.213187 ignition[887]: INFO : Ignition finished successfully May 15 10:38:16.220419 kernel: audit: type=1131 audit(1747305496.216:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.197204 systemd[1]: Closed iscsiuio.socket. May 15 10:38:16.199951 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 10:38:16.200022 systemd[1]: Stopped ignition-mount.service. May 15 10:38:16.227068 kernel: audit: type=1131 audit(1747305496.223:58): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.202209 systemd[1]: Stopped target network.target. May 15 10:38:16.205821 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 10:38:16.205858 systemd[1]: Stopped ignition-disks.service. May 15 10:38:16.207098 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 10:38:16.240111 kernel: audit: type=1131 audit(1747305496.232:59): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.240140 kernel: audit: type=1131 audit(1747305496.232:60): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.207131 systemd[1]: Stopped ignition-kargs.service. May 15 10:38:16.211825 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 10:38:16.246558 kernel: audit: type=1131 audit(1747305496.241:61): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.211860 systemd[1]: Stopped ignition-setup.service. May 15 10:38:16.216380 systemd[1]: Stopping systemd-networkd.service... May 15 10:38:16.221770 systemd[1]: Stopping systemd-resolved.service... May 15 10:38:16.222070 systemd-networkd[727]: eth0: DHCPv6 lease lost May 15 10:38:16.252512 kernel: audit: type=1334 audit(1747305496.249:62): prog-id=9 op=UNLOAD May 15 10:38:16.249000 audit: BPF prog-id=9 op=UNLOAD May 15 10:38:16.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.223238 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 10:38:16.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.223315 systemd[1]: Stopped systemd-networkd.service. May 15 10:38:16.226702 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 10:38:16.226746 systemd[1]: Closed systemd-networkd.socket. May 15 10:38:16.229520 systemd[1]: Stopping network-cleanup.service... May 15 10:38:16.231104 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 10:38:16.231220 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 10:38:16.232199 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 10:38:16.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.260000 audit: BPF prog-id=6 op=UNLOAD May 15 10:38:16.232235 systemd[1]: Stopped systemd-sysctl.service. May 15 10:38:16.240194 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 10:38:16.240229 systemd[1]: Stopped systemd-modules-load.service. May 15 10:38:16.241921 systemd[1]: Stopping systemd-udevd.service... May 15 10:38:16.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.246875 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 10:38:16.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.249360 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 10:38:16.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.249471 systemd[1]: Stopped network-cleanup.service. May 15 10:38:16.251789 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 10:38:16.251878 systemd[1]: Stopped systemd-resolved.service. May 15 10:38:16.259127 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 10:38:16.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.259246 systemd[1]: Stopped systemd-udevd.service. May 15 10:38:16.262155 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 10:38:16.262189 systemd[1]: Closed systemd-udevd-control.socket. May 15 10:38:16.262703 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 10:38:16.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.262726 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 10:38:16.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.263038 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 10:38:16.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.263072 systemd[1]: Stopped dracut-pre-udev.service. May 15 10:38:16.266789 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 10:38:16.266827 systemd[1]: Stopped dracut-cmdline.service. May 15 10:38:16.268288 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 10:38:16.268322 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 10:38:16.271440 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 10:38:16.272659 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 15 10:38:16.272705 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 15 10:38:16.279836 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 10:38:16.279874 systemd[1]: Stopped kmod-static-nodes.service. May 15 10:38:16.281443 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 10:38:16.281478 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 10:38:16.282856 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 15 10:38:16.283269 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 10:38:16.283341 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 10:38:16.329178 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 10:38:16.329289 systemd[1]: Stopped sysroot-boot.service. May 15 10:38:16.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.331125 systemd[1]: Reached target initrd-switch-root.target. May 15 10:38:16.332509 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 10:38:16.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.332549 systemd[1]: Stopped initrd-setup-root.service. May 15 10:38:16.334937 systemd[1]: Starting initrd-switch-root.service... May 15 10:38:16.354495 systemd[1]: Switching root. May 15 10:38:16.371895 systemd-journald[199]: Journal stopped May 15 10:38:18.856271 systemd-journald[199]: Received SIGTERM from PID 1 (systemd). May 15 10:38:18.856328 kernel: SELinux: Class mctp_socket not defined in policy. May 15 10:38:18.856341 kernel: SELinux: Class anon_inode not defined in policy. May 15 10:38:18.856351 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 10:38:18.856363 kernel: SELinux: policy capability network_peer_controls=1 May 15 10:38:18.856376 kernel: SELinux: policy capability open_perms=1 May 15 10:38:18.856389 kernel: SELinux: policy capability extended_socket_class=1 May 15 10:38:18.856401 kernel: SELinux: policy capability always_check_network=0 May 15 10:38:18.856425 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 10:38:18.857113 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 10:38:18.857135 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 10:38:18.857146 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 10:38:18.857157 systemd[1]: Successfully loaded SELinux policy in 40.310ms. May 15 10:38:18.857179 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.945ms. May 15 10:38:18.857191 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:38:18.857202 systemd[1]: Detected virtualization kvm. May 15 10:38:18.857213 systemd[1]: Detected architecture x86-64. May 15 10:38:18.857234 systemd[1]: Detected first boot. May 15 10:38:18.857249 systemd[1]: Initializing machine ID from VM UUID. May 15 10:38:18.857259 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 10:38:18.857269 systemd[1]: Populated /etc with preset unit settings. May 15 10:38:18.857280 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:38:18.857299 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:38:18.857311 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:38:18.857322 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 10:38:18.857333 systemd[1]: Stopped initrd-switch-root.service. May 15 10:38:18.857344 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 10:38:18.857354 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 10:38:18.857369 systemd[1]: Created slice system-addon\x2drun.slice. May 15 10:38:18.857389 systemd[1]: Created slice system-getty.slice. May 15 10:38:18.857400 systemd[1]: Created slice system-modprobe.slice. May 15 10:38:18.857410 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 10:38:18.857421 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 10:38:18.857431 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 10:38:18.857442 systemd[1]: Created slice user.slice. May 15 10:38:18.857452 systemd[1]: Started systemd-ask-password-console.path. May 15 10:38:18.857462 systemd[1]: Started systemd-ask-password-wall.path. May 15 10:38:18.857472 systemd[1]: Set up automount boot.automount. May 15 10:38:18.857489 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 10:38:18.857500 systemd[1]: Stopped target initrd-switch-root.target. May 15 10:38:18.857511 systemd[1]: Stopped target initrd-fs.target. May 15 10:38:18.857521 systemd[1]: Stopped target initrd-root-fs.target. May 15 10:38:18.857531 systemd[1]: Reached target integritysetup.target. May 15 10:38:18.857542 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:38:18.857553 systemd[1]: Reached target remote-fs.target. May 15 10:38:18.857563 systemd[1]: Reached target slices.target. May 15 10:38:18.857581 systemd[1]: Reached target swap.target. May 15 10:38:18.857591 systemd[1]: Reached target torcx.target. May 15 10:38:18.857602 systemd[1]: Reached target veritysetup.target. May 15 10:38:18.857616 systemd[1]: Listening on systemd-coredump.socket. May 15 10:38:18.857627 systemd[1]: Listening on systemd-initctl.socket. May 15 10:38:18.857638 systemd[1]: Listening on systemd-networkd.socket. May 15 10:38:18.857648 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:38:18.857658 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:38:18.857669 systemd[1]: Listening on systemd-userdbd.socket. May 15 10:38:18.857679 systemd[1]: Mounting dev-hugepages.mount... May 15 10:38:18.857696 systemd[1]: Mounting dev-mqueue.mount... May 15 10:38:18.857707 systemd[1]: Mounting media.mount... May 15 10:38:18.857718 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:18.857728 systemd[1]: Mounting sys-kernel-debug.mount... May 15 10:38:18.857739 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 10:38:18.857750 systemd[1]: Mounting tmp.mount... May 15 10:38:18.857760 systemd[1]: Starting flatcar-tmpfiles.service... May 15 10:38:18.857770 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:38:18.857781 systemd[1]: Starting kmod-static-nodes.service... May 15 10:38:18.857798 systemd[1]: Starting modprobe@configfs.service... May 15 10:38:18.857809 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:38:18.857819 systemd[1]: Starting modprobe@drm.service... May 15 10:38:18.858465 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:38:18.858479 systemd[1]: Starting modprobe@fuse.service... May 15 10:38:18.858490 systemd[1]: Starting modprobe@loop.service... May 15 10:38:18.858501 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 10:38:18.858516 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 10:38:18.858535 systemd[1]: Stopped systemd-fsck-root.service. May 15 10:38:18.858546 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 10:38:18.858557 systemd[1]: Stopped systemd-fsck-usr.service. May 15 10:38:18.858567 kernel: loop: module loaded May 15 10:38:18.858577 kernel: fuse: init (API version 7.34) May 15 10:38:18.858587 systemd[1]: Stopped systemd-journald.service. May 15 10:38:18.858597 systemd[1]: Starting systemd-journald.service... May 15 10:38:18.858608 systemd[1]: Starting systemd-modules-load.service... May 15 10:38:18.858619 systemd[1]: Starting systemd-network-generator.service... May 15 10:38:18.858629 systemd[1]: Starting systemd-remount-fs.service... May 15 10:38:18.858647 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:38:18.858657 systemd[1]: verity-setup.service: Deactivated successfully. May 15 10:38:18.858668 systemd[1]: Stopped verity-setup.service. May 15 10:38:18.858678 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:18.858688 systemd[1]: Mounted dev-hugepages.mount. May 15 10:38:18.858698 systemd[1]: Mounted dev-mqueue.mount. May 15 10:38:18.858708 systemd[1]: Mounted media.mount. May 15 10:38:18.858718 systemd[1]: Mounted sys-kernel-debug.mount. May 15 10:38:18.858731 systemd-journald[1000]: Journal started May 15 10:38:18.858781 systemd-journald[1000]: Runtime Journal (/run/log/journal/feaa0f12438e4d1da291bf59a45e14ed) is 6.0M, max 48.4M, 42.4M free. May 15 10:38:16.434000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 10:38:16.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:38:16.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:38:16.644000 audit: BPF prog-id=10 op=LOAD May 15 10:38:16.644000 audit: BPF prog-id=10 op=UNLOAD May 15 10:38:16.644000 audit: BPF prog-id=11 op=LOAD May 15 10:38:16.644000 audit: BPF prog-id=11 op=UNLOAD May 15 10:38:16.673000 audit[919]: AVC avc: denied { associate } for pid=919 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 10:38:16.673000 audit[919]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001878d2 a1=c00002ae40 a2=c000029080 a3=32 items=0 ppid=902 pid=919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:16.673000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:38:16.675000 audit[919]: AVC avc: denied { associate } for pid=919 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 10:38:16.675000 audit[919]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001879a9 a2=1ed a3=0 items=2 ppid=902 pid=919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:16.675000 audit: CWD cwd="/" May 15 10:38:16.675000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:16.675000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:16.675000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:38:18.722000 audit: BPF prog-id=12 op=LOAD May 15 10:38:18.722000 audit: BPF prog-id=3 op=UNLOAD May 15 10:38:18.722000 audit: BPF prog-id=13 op=LOAD May 15 10:38:18.722000 audit: BPF prog-id=14 op=LOAD May 15 10:38:18.722000 audit: BPF prog-id=4 op=UNLOAD May 15 10:38:18.722000 audit: BPF prog-id=5 op=UNLOAD May 15 10:38:18.723000 audit: BPF prog-id=15 op=LOAD May 15 10:38:18.723000 audit: BPF prog-id=12 op=UNLOAD May 15 10:38:18.723000 audit: BPF prog-id=16 op=LOAD May 15 10:38:18.723000 audit: BPF prog-id=17 op=LOAD May 15 10:38:18.723000 audit: BPF prog-id=13 op=UNLOAD May 15 10:38:18.723000 audit: BPF prog-id=14 op=UNLOAD May 15 10:38:18.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.733000 audit: BPF prog-id=15 op=UNLOAD May 15 10:38:18.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.833000 audit: BPF prog-id=18 op=LOAD May 15 10:38:18.833000 audit: BPF prog-id=19 op=LOAD May 15 10:38:18.833000 audit: BPF prog-id=20 op=LOAD May 15 10:38:18.833000 audit: BPF prog-id=16 op=UNLOAD May 15 10:38:18.833000 audit: BPF prog-id=17 op=UNLOAD May 15 10:38:18.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.854000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 10:38:18.854000 audit[1000]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffca4354230 a2=4000 a3=7ffca43542cc items=0 ppid=1 pid=1000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:18.854000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 10:38:18.720856 systemd[1]: Queued start job for default target multi-user.target. May 15 10:38:16.672169 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:38:18.861675 systemd[1]: Started systemd-journald.service. May 15 10:38:18.720867 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 10:38:18.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.672379 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:16Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:38:18.724103 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 10:38:16.672396 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:16Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:38:18.861823 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 10:38:16.672423 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:16Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 10:38:18.862687 systemd[1]: Mounted tmp.mount. May 15 10:38:16.672433 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:16Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 10:38:16.672462 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:16Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 10:38:18.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.672474 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:16Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 10:38:18.863638 systemd[1]: Finished flatcar-tmpfiles.service. May 15 10:38:16.672657 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:16Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 10:38:16.672689 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:16Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:38:18.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.672701 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:16Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:38:18.864772 systemd[1]: Finished kmod-static-nodes.service. May 15 10:38:16.673004 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:16Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 10:38:16.673059 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:16Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 10:38:18.865828 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 10:38:16.673076 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:16Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 May 15 10:38:18.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:16.673097 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:16Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 10:38:18.865971 systemd[1]: Finished modprobe@configfs.service. May 15 10:38:16.673113 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:16Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 May 15 10:38:16.673126 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:16Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 10:38:18.867114 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:38:18.453430 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:18Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:38:18.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.453705 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:18Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:38:18.867255 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:38:18.453814 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:18Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:38:18.453976 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:18Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:38:18.454047 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:18Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 10:38:18.454117 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:38:18Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 10:38:18.868367 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:38:18.868528 systemd[1]: Finished modprobe@drm.service. May 15 10:38:18.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.869548 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:38:18.869713 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:38:18.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.870750 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 10:38:18.870917 systemd[1]: Finished modprobe@fuse.service. May 15 10:38:18.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.871900 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:38:18.872067 systemd[1]: Finished modprobe@loop.service. May 15 10:38:18.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.873118 systemd[1]: Finished systemd-modules-load.service. May 15 10:38:18.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.874232 systemd[1]: Finished systemd-network-generator.service. May 15 10:38:18.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.875400 systemd[1]: Finished systemd-remount-fs.service. May 15 10:38:18.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.876571 systemd[1]: Reached target network-pre.target. May 15 10:38:18.878394 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 10:38:18.880178 systemd[1]: Mounting sys-kernel-config.mount... May 15 10:38:18.880916 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 10:38:18.882388 systemd[1]: Starting systemd-hwdb-update.service... May 15 10:38:18.884855 systemd[1]: Starting systemd-journal-flush.service... May 15 10:38:18.885801 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:38:18.890171 systemd-journald[1000]: Time spent on flushing to /var/log/journal/feaa0f12438e4d1da291bf59a45e14ed is 25.367ms for 1160 entries. May 15 10:38:18.890171 systemd-journald[1000]: System Journal (/var/log/journal/feaa0f12438e4d1da291bf59a45e14ed) is 8.0M, max 195.6M, 187.6M free. May 15 10:38:18.930945 systemd-journald[1000]: Received client request to flush runtime journal. May 15 10:38:18.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.887016 systemd[1]: Starting systemd-random-seed.service... May 15 10:38:18.888055 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:38:18.888903 systemd[1]: Starting systemd-sysctl.service... May 15 10:38:18.890675 systemd[1]: Starting systemd-sysusers.service... May 15 10:38:18.932247 udevadm[1024]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 15 10:38:18.894209 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 10:38:18.895325 systemd[1]: Mounted sys-kernel-config.mount. May 15 10:38:18.901989 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:38:18.904275 systemd[1]: Starting systemd-udev-settle.service... May 15 10:38:18.905396 systemd[1]: Finished systemd-random-seed.service. May 15 10:38:18.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.906665 systemd[1]: Finished systemd-sysctl.service. May 15 10:38:18.907770 systemd[1]: Reached target first-boot-complete.target. May 15 10:38:18.910470 systemd[1]: Finished systemd-sysusers.service. May 15 10:38:18.912417 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:38:18.931749 systemd[1]: Finished systemd-journal-flush.service. May 15 10:38:18.932992 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:38:18.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:19.520429 systemd[1]: Finished systemd-hwdb-update.service. May 15 10:38:19.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:19.522000 audit: BPF prog-id=21 op=LOAD May 15 10:38:19.522000 audit: BPF prog-id=22 op=LOAD May 15 10:38:19.522000 audit: BPF prog-id=7 op=UNLOAD May 15 10:38:19.522000 audit: BPF prog-id=8 op=UNLOAD May 15 10:38:19.522942 systemd[1]: Starting systemd-udevd.service... May 15 10:38:19.542088 systemd-udevd[1028]: Using default interface naming scheme 'v252'. May 15 10:38:19.554527 systemd[1]: Started systemd-udevd.service. May 15 10:38:19.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:19.557000 audit: BPF prog-id=23 op=LOAD May 15 10:38:19.558487 systemd[1]: Starting systemd-networkd.service... May 15 10:38:19.564000 audit: BPF prog-id=24 op=LOAD May 15 10:38:19.564000 audit: BPF prog-id=25 op=LOAD May 15 10:38:19.564000 audit: BPF prog-id=26 op=LOAD May 15 10:38:19.564987 systemd[1]: Starting systemd-userdbd.service... May 15 10:38:19.590993 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 10:38:19.591208 systemd[1]: Started systemd-userdbd.service. May 15 10:38:19.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:19.608705 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:38:19.624072 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 15 10:38:19.632073 kernel: ACPI: button: Power Button [PWRF] May 15 10:38:19.636976 systemd-networkd[1039]: lo: Link UP May 15 10:38:19.636986 systemd-networkd[1039]: lo: Gained carrier May 15 10:38:19.637771 systemd-networkd[1039]: Enumeration completed May 15 10:38:19.637857 systemd[1]: Started systemd-networkd.service. May 15 10:38:19.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:19.639431 systemd-networkd[1039]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:38:19.640471 systemd-networkd[1039]: eth0: Link UP May 15 10:38:19.640477 systemd-networkd[1039]: eth0: Gained carrier May 15 10:38:19.643000 audit[1049]: AVC avc: denied { confidentiality } for pid=1049 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 10:38:19.643000 audit[1049]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5566619f8120 a1=338ac a2=7fb42d5babc5 a3=5 items=110 ppid=1028 pid=1049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:19.643000 audit: CWD cwd="/" May 15 10:38:19.643000 audit: PATH item=0 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=1 name=(null) inode=11974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=2 name=(null) inode=11974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=3 name=(null) inode=11975 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=4 name=(null) inode=11974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=5 name=(null) inode=11976 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=6 name=(null) inode=11974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=7 name=(null) inode=11977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=8 name=(null) inode=11977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=9 name=(null) inode=11978 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=10 name=(null) inode=11977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=11 name=(null) inode=11979 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=12 name=(null) inode=11977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=13 name=(null) inode=11980 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=14 name=(null) inode=11977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=15 name=(null) inode=11981 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=16 name=(null) inode=11977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=17 name=(null) inode=11982 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=18 name=(null) inode=11974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=19 name=(null) inode=11983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=20 name=(null) inode=11983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=21 name=(null) inode=11984 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=22 name=(null) inode=11983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=23 name=(null) inode=11985 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=24 name=(null) inode=11983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=25 name=(null) inode=11986 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=26 name=(null) inode=11983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=27 name=(null) inode=11987 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=28 name=(null) inode=11983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=29 name=(null) inode=11988 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=30 name=(null) inode=11974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=31 name=(null) inode=11989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=32 name=(null) inode=11989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=33 name=(null) inode=11990 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=34 name=(null) inode=11989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=35 name=(null) inode=11991 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=36 name=(null) inode=11989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=37 name=(null) inode=11992 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=38 name=(null) inode=11989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=39 name=(null) inode=11993 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=40 name=(null) inode=11989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=41 name=(null) inode=11994 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=42 name=(null) inode=11974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=43 name=(null) inode=11995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=44 name=(null) inode=11995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=45 name=(null) inode=11996 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=46 name=(null) inode=11995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=47 name=(null) inode=11997 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=48 name=(null) inode=11995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=49 name=(null) inode=11998 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=50 name=(null) inode=11995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=51 name=(null) inode=11999 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=52 name=(null) inode=11995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=53 name=(null) inode=12000 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=54 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=55 name=(null) inode=12001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=56 name=(null) inode=12001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=57 name=(null) inode=12002 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=58 name=(null) inode=12001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=59 name=(null) inode=12003 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=60 name=(null) inode=12001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=61 name=(null) inode=12004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=62 name=(null) inode=12004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=63 name=(null) inode=12005 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=64 name=(null) inode=12004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=65 name=(null) inode=12006 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=66 name=(null) inode=12004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=67 name=(null) inode=12007 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=68 name=(null) inode=12004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=69 name=(null) inode=12008 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=70 name=(null) inode=12004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=71 name=(null) inode=12009 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=72 name=(null) inode=12001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=73 name=(null) inode=12010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=74 name=(null) inode=12010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=75 name=(null) inode=12011 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=76 name=(null) inode=12010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=77 name=(null) inode=12012 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=78 name=(null) inode=12010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=79 name=(null) inode=12013 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=80 name=(null) inode=12010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=81 name=(null) inode=12014 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=82 name=(null) inode=12010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=83 name=(null) inode=12015 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=84 name=(null) inode=12001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=85 name=(null) inode=12016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=86 name=(null) inode=12016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=87 name=(null) inode=12017 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=88 name=(null) inode=12016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=89 name=(null) inode=12018 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=90 name=(null) inode=12016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=91 name=(null) inode=12019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=92 name=(null) inode=12016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=93 name=(null) inode=12020 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=94 name=(null) inode=12016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=95 name=(null) inode=12021 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=96 name=(null) inode=12001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=97 name=(null) inode=12022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=98 name=(null) inode=12022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=99 name=(null) inode=12023 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=100 name=(null) inode=12022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=101 name=(null) inode=12024 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=102 name=(null) inode=12022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=103 name=(null) inode=12025 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=104 name=(null) inode=12022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=105 name=(null) inode=12026 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=106 name=(null) inode=12022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=107 name=(null) inode=12027 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PATH item=109 name=(null) inode=12028 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:19.643000 audit: PROCTITLE proctitle="(udev-worker)" May 15 10:38:19.652994 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 15 10:38:19.672533 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 15 10:38:19.672659 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 15 10:38:19.672674 kernel: mousedev: PS/2 mouse device common for all mice May 15 10:38:19.672687 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 15 10:38:19.672809 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 15 10:38:19.653341 systemd-networkd[1039]: eth0: DHCPv4 address 10.0.0.52/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:38:19.730642 kernel: kvm: Nested Virtualization enabled May 15 10:38:19.730713 kernel: SVM: kvm: Nested Paging enabled May 15 10:38:19.730727 kernel: SVM: Virtual VMLOAD VMSAVE supported May 15 10:38:19.731435 kernel: SVM: Virtual GIF supported May 15 10:38:19.748085 kernel: EDAC MC: Ver: 3.0.0 May 15 10:38:19.774387 systemd[1]: Finished systemd-udev-settle.service. May 15 10:38:19.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:19.776405 systemd[1]: Starting lvm2-activation-early.service... May 15 10:38:19.789720 lvm[1064]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:38:19.816671 systemd[1]: Finished lvm2-activation-early.service. May 15 10:38:19.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:19.817658 systemd[1]: Reached target cryptsetup.target. May 15 10:38:19.819365 systemd[1]: Starting lvm2-activation.service... May 15 10:38:19.822608 lvm[1065]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:38:19.847576 systemd[1]: Finished lvm2-activation.service. May 15 10:38:19.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:19.848599 systemd[1]: Reached target local-fs-pre.target. May 15 10:38:19.849489 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 10:38:19.849515 systemd[1]: Reached target local-fs.target. May 15 10:38:19.850323 systemd[1]: Reached target machines.target. May 15 10:38:19.852063 systemd[1]: Starting ldconfig.service... May 15 10:38:19.853056 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:38:19.853100 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:19.854017 systemd[1]: Starting systemd-boot-update.service... May 15 10:38:19.855839 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 10:38:19.857846 systemd[1]: Starting systemd-machine-id-commit.service... May 15 10:38:19.859816 systemd[1]: Starting systemd-sysext.service... May 15 10:38:19.862406 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1067 (bootctl) May 15 10:38:19.863438 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 10:38:19.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:19.868319 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 10:38:19.871374 systemd[1]: Unmounting usr-share-oem.mount... May 15 10:38:19.875497 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 10:38:19.875661 systemd[1]: Unmounted usr-share-oem.mount. May 15 10:38:19.886064 kernel: loop0: detected capacity change from 0 to 218376 May 15 10:38:19.905654 systemd-fsck[1075]: fsck.fat 4.2 (2021-01-31) May 15 10:38:19.905654 systemd-fsck[1075]: /dev/vda1: 791 files, 120752/258078 clusters May 15 10:38:19.907485 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 10:38:19.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:19.910292 systemd[1]: Mounting boot.mount... May 15 10:38:20.135193 systemd[1]: Mounted boot.mount. May 15 10:38:20.144051 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 10:38:20.149042 systemd[1]: Finished systemd-boot-update.service. May 15 10:38:20.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.152621 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 10:38:20.153152 systemd[1]: Finished systemd-machine-id-commit.service. May 15 10:38:20.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.164055 kernel: loop1: detected capacity change from 0 to 218376 May 15 10:38:20.171306 (sd-sysext)[1080]: Using extensions 'kubernetes'. May 15 10:38:20.171715 (sd-sysext)[1080]: Merged extensions into '/usr'. May 15 10:38:20.186294 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:20.187556 systemd[1]: Mounting usr-share-oem.mount... May 15 10:38:20.188441 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:38:20.189462 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:38:20.193156 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:38:20.195377 systemd[1]: Starting modprobe@loop.service... May 15 10:38:20.196330 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:38:20.196450 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:20.196557 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:20.199077 systemd[1]: Mounted usr-share-oem.mount. May 15 10:38:20.200148 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:38:20.200275 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:38:20.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.201459 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:38:20.201567 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:38:20.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.202959 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:38:20.203123 systemd[1]: Finished modprobe@loop.service. May 15 10:38:20.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.204383 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:38:20.204475 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:38:20.205407 systemd[1]: Finished systemd-sysext.service. May 15 10:38:20.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.207538 systemd[1]: Starting ensure-sysext.service... May 15 10:38:20.209358 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 10:38:20.214620 ldconfig[1066]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 10:38:20.231478 systemd[1]: Finished ldconfig.service. May 15 10:38:20.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.232430 systemd[1]: Reloading. May 15 10:38:20.232500 systemd-tmpfiles[1087]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 10:38:20.233248 systemd-tmpfiles[1087]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 10:38:20.234793 systemd-tmpfiles[1087]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 10:38:20.293516 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-05-15T10:38:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:38:20.293878 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-05-15T10:38:20Z" level=info msg="torcx already run" May 15 10:38:20.358719 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:38:20.358734 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:38:20.375666 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:38:20.426000 audit: BPF prog-id=27 op=LOAD May 15 10:38:20.426000 audit: BPF prog-id=23 op=UNLOAD May 15 10:38:20.428000 audit: BPF prog-id=28 op=LOAD May 15 10:38:20.428000 audit: BPF prog-id=18 op=UNLOAD May 15 10:38:20.428000 audit: BPF prog-id=29 op=LOAD May 15 10:38:20.428000 audit: BPF prog-id=30 op=LOAD May 15 10:38:20.428000 audit: BPF prog-id=19 op=UNLOAD May 15 10:38:20.428000 audit: BPF prog-id=20 op=UNLOAD May 15 10:38:20.428000 audit: BPF prog-id=31 op=LOAD May 15 10:38:20.428000 audit: BPF prog-id=32 op=LOAD May 15 10:38:20.428000 audit: BPF prog-id=21 op=UNLOAD May 15 10:38:20.428000 audit: BPF prog-id=22 op=UNLOAD May 15 10:38:20.429000 audit: BPF prog-id=33 op=LOAD May 15 10:38:20.429000 audit: BPF prog-id=24 op=UNLOAD May 15 10:38:20.429000 audit: BPF prog-id=34 op=LOAD May 15 10:38:20.429000 audit: BPF prog-id=35 op=LOAD May 15 10:38:20.429000 audit: BPF prog-id=25 op=UNLOAD May 15 10:38:20.429000 audit: BPF prog-id=26 op=UNLOAD May 15 10:38:20.431753 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 10:38:20.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.435952 systemd[1]: Starting audit-rules.service... May 15 10:38:20.437627 systemd[1]: Starting clean-ca-certificates.service... May 15 10:38:20.439903 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 10:38:20.441000 audit: BPF prog-id=36 op=LOAD May 15 10:38:20.442523 systemd[1]: Starting systemd-resolved.service... May 15 10:38:20.444000 audit: BPF prog-id=37 op=LOAD May 15 10:38:20.444963 systemd[1]: Starting systemd-timesyncd.service... May 15 10:38:20.446695 systemd[1]: Starting systemd-update-utmp.service... May 15 10:38:20.448231 systemd[1]: Finished clean-ca-certificates.service. May 15 10:38:20.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.451000 audit[1158]: SYSTEM_BOOT pid=1158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 10:38:20.455284 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:38:20.456795 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:38:20.458613 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:38:20.460448 systemd[1]: Starting modprobe@loop.service... May 15 10:38:20.461290 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:38:20.461396 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:20.461487 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:38:20.462521 systemd[1]: Finished systemd-update-utmp.service. May 15 10:38:20.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.463961 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 10:38:20.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.465491 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:38:20.465608 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:38:20.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.466836 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:38:20.466938 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:38:20.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.468175 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:38:20.468278 systemd[1]: Finished modprobe@loop.service. May 15 10:38:20.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.471339 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:38:20.472580 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:38:20.474585 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:38:20.476693 systemd[1]: Starting modprobe@loop.service... May 15 10:38:20.477460 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:38:20.477560 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:20.479078 systemd[1]: Starting systemd-update-done.service... May 15 10:38:20.479883 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:38:20.480914 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:38:20.481044 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:38:20.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.482392 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:38:20.482495 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:38:20.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.483879 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:38:20.483980 systemd[1]: Finished modprobe@loop.service. May 15 10:38:20.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.485319 systemd[1]: Finished systemd-update-done.service. May 15 10:38:20.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:20.486754 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:38:20.486856 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:38:20.487000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 10:38:20.487000 audit[1176]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff42561140 a2=420 a3=0 items=0 ppid=1149 pid=1176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:20.487000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 10:38:20.487871 augenrules[1176]: No rules May 15 10:38:20.489515 systemd[1]: Finished audit-rules.service. May 15 10:38:20.490792 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:38:20.492576 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:38:20.494595 systemd[1]: Starting modprobe@drm.service... May 15 10:38:20.496588 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:38:20.499917 systemd[1]: Starting modprobe@loop.service... May 15 10:38:20.500708 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:38:20.500818 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:20.502411 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 10:38:20.503428 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:38:20.504525 systemd[1]: Started systemd-timesyncd.service. May 15 10:38:21.026811 systemd-timesyncd[1156]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 15 10:38:21.026856 systemd-timesyncd[1156]: Initial clock synchronization to Thu 2025-05-15 10:38:21.026738 UTC. May 15 10:38:21.027934 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:38:21.028209 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:38:21.029389 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:38:21.029503 systemd[1]: Finished modprobe@drm.service. May 15 10:38:21.030658 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:38:21.030755 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:38:21.031923 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:38:21.032019 systemd[1]: Finished modprobe@loop.service. May 15 10:38:21.033324 systemd[1]: Reached target time-set.target. May 15 10:38:21.034182 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:38:21.034213 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:38:21.034501 systemd[1]: Finished ensure-sysext.service. May 15 10:38:21.042290 systemd-resolved[1153]: Positive Trust Anchors: May 15 10:38:21.042302 systemd-resolved[1153]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:38:21.042327 systemd-resolved[1153]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:38:21.048605 systemd-resolved[1153]: Defaulting to hostname 'linux'. May 15 10:38:21.049957 systemd[1]: Started systemd-resolved.service. May 15 10:38:21.050852 systemd[1]: Reached target network.target. May 15 10:38:21.051638 systemd[1]: Reached target nss-lookup.target. May 15 10:38:21.052449 systemd[1]: Reached target sysinit.target. May 15 10:38:21.053291 systemd[1]: Started motdgen.path. May 15 10:38:21.054011 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 10:38:21.055221 systemd[1]: Started logrotate.timer. May 15 10:38:21.056031 systemd[1]: Started mdadm.timer. May 15 10:38:21.056721 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 10:38:21.057582 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 10:38:21.057602 systemd[1]: Reached target paths.target. May 15 10:38:21.058401 systemd[1]: Reached target timers.target. May 15 10:38:21.059451 systemd[1]: Listening on dbus.socket. May 15 10:38:21.061082 systemd[1]: Starting docker.socket... May 15 10:38:21.063953 systemd[1]: Listening on sshd.socket. May 15 10:38:21.064880 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:21.065288 systemd[1]: Listening on docker.socket. May 15 10:38:21.066143 systemd[1]: Reached target sockets.target. May 15 10:38:21.066991 systemd[1]: Reached target basic.target. May 15 10:38:21.067898 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:38:21.067925 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:38:21.069039 systemd[1]: Starting containerd.service... May 15 10:38:21.070714 systemd[1]: Starting dbus.service... May 15 10:38:21.072997 systemd[1]: Starting enable-oem-cloudinit.service... May 15 10:38:21.074955 systemd[1]: Starting extend-filesystems.service... May 15 10:38:21.076407 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 10:38:21.077453 systemd[1]: Starting motdgen.service... May 15 10:38:21.079890 systemd[1]: Starting prepare-helm.service... May 15 10:38:21.081787 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 10:38:21.083986 jq[1191]: false May 15 10:38:21.089459 dbus-daemon[1190]: [system] SELinux support is enabled May 15 10:38:21.084573 systemd[1]: Starting sshd-keygen.service... May 15 10:38:21.087704 systemd[1]: Starting systemd-logind.service... May 15 10:38:21.088617 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:21.088685 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 10:38:21.089095 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 10:38:21.089850 systemd[1]: Starting update-engine.service... May 15 10:38:21.091938 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 10:38:21.093570 systemd[1]: Started dbus.service. May 15 10:38:21.101082 jq[1205]: true May 15 10:38:21.098513 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 10:38:21.101265 extend-filesystems[1192]: Found loop1 May 15 10:38:21.101265 extend-filesystems[1192]: Found sr0 May 15 10:38:21.101265 extend-filesystems[1192]: Found vda May 15 10:38:21.101265 extend-filesystems[1192]: Found vda1 May 15 10:38:21.101265 extend-filesystems[1192]: Found vda2 May 15 10:38:21.101265 extend-filesystems[1192]: Found vda3 May 15 10:38:21.101265 extend-filesystems[1192]: Found usr May 15 10:38:21.101265 extend-filesystems[1192]: Found vda4 May 15 10:38:21.101265 extend-filesystems[1192]: Found vda6 May 15 10:38:21.101265 extend-filesystems[1192]: Found vda7 May 15 10:38:21.101265 extend-filesystems[1192]: Found vda9 May 15 10:38:21.101265 extend-filesystems[1192]: Checking size of /dev/vda9 May 15 10:38:21.098691 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 10:38:21.099855 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 10:38:21.170598 tar[1214]: linux-amd64/LICENSE May 15 10:38:21.170598 tar[1214]: linux-amd64/helm May 15 10:38:21.100040 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 10:38:21.170921 jq[1215]: true May 15 10:38:21.154951 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 10:38:21.155017 systemd[1]: Reached target system-config.target. May 15 10:38:21.156590 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 10:38:21.156606 systemd[1]: Reached target user-config.target. May 15 10:38:21.165889 systemd[1]: motdgen.service: Deactivated successfully. May 15 10:38:21.166070 systemd[1]: Finished motdgen.service. May 15 10:38:21.192061 extend-filesystems[1192]: Resized partition /dev/vda9 May 15 10:38:21.195063 extend-filesystems[1240]: resize2fs 1.46.5 (30-Dec-2021) May 15 10:38:21.204807 update_engine[1204]: I0515 10:38:21.196936 1204 main.cc:92] Flatcar Update Engine starting May 15 10:38:21.204807 update_engine[1204]: I0515 10:38:21.200816 1204 update_check_scheduler.cc:74] Next update check in 8m15s May 15 10:38:21.200766 systemd[1]: Started update-engine.service. May 15 10:38:21.208409 bash[1237]: Updated "/home/core/.ssh/authorized_keys" May 15 10:38:21.207607 systemd[1]: Started locksmithd.service. May 15 10:38:21.209079 systemd-logind[1201]: Watching system buttons on /dev/input/event1 (Power Button) May 15 10:38:21.209098 systemd-logind[1201]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 10:38:21.209504 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 10:38:21.210863 systemd-logind[1201]: New seat seat0. May 15 10:38:21.278566 env[1217]: time="2025-05-15T10:38:21.271198237Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 10:38:21.278868 systemd-networkd[1039]: eth0: Gained IPv6LL May 15 10:38:21.286532 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 10:38:21.288804 systemd[1]: Started systemd-logind.service. May 15 10:38:21.290169 systemd[1]: Reached target network-online.target. May 15 10:38:21.293431 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 15 10:38:21.292843 systemd[1]: Starting kubelet.service... May 15 10:38:21.301312 env[1217]: time="2025-05-15T10:38:21.299757295Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 10:38:21.301312 env[1217]: time="2025-05-15T10:38:21.299875908Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 10:38:21.303739 env[1217]: time="2025-05-15T10:38:21.303296714Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 10:38:21.303739 env[1217]: time="2025-05-15T10:38:21.303323485Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 10:38:21.303739 env[1217]: time="2025-05-15T10:38:21.303591067Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:38:21.303739 env[1217]: time="2025-05-15T10:38:21.303606996Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 10:38:21.303739 env[1217]: time="2025-05-15T10:38:21.303622295Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 10:38:21.303739 env[1217]: time="2025-05-15T10:38:21.303631953Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 10:38:21.303739 env[1217]: time="2025-05-15T10:38:21.303695392Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 10:38:21.304173 env[1217]: time="2025-05-15T10:38:21.304154083Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 10:38:21.304489 env[1217]: time="2025-05-15T10:38:21.304458864Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:38:21.304601 env[1217]: time="2025-05-15T10:38:21.304574120Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 10:38:21.304775 env[1217]: time="2025-05-15T10:38:21.304756483Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 10:38:21.304885 env[1217]: time="2025-05-15T10:38:21.304867481Z" level=info msg="metadata content store policy set" policy=shared May 15 10:38:21.333394 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 15 10:38:21.346089 locksmithd[1242]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 10:38:21.361232 extend-filesystems[1240]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 10:38:21.361232 extend-filesystems[1240]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 10:38:21.361232 extend-filesystems[1240]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 15 10:38:21.366690 extend-filesystems[1192]: Resized filesystem in /dev/vda9 May 15 10:38:21.364120 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 10:38:21.367740 env[1217]: time="2025-05-15T10:38:21.363440948Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 10:38:21.367740 env[1217]: time="2025-05-15T10:38:21.363508144Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 10:38:21.367740 env[1217]: time="2025-05-15T10:38:21.363529474Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 10:38:21.367740 env[1217]: time="2025-05-15T10:38:21.363583155Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 10:38:21.367740 env[1217]: time="2025-05-15T10:38:21.363598383Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 10:38:21.367740 env[1217]: time="2025-05-15T10:38:21.363611027Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 10:38:21.367740 env[1217]: time="2025-05-15T10:38:21.363677662Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 10:38:21.367740 env[1217]: time="2025-05-15T10:38:21.363696978Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 10:38:21.367740 env[1217]: time="2025-05-15T10:38:21.363722666Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 10:38:21.367740 env[1217]: time="2025-05-15T10:38:21.363735340Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 10:38:21.367740 env[1217]: time="2025-05-15T10:38:21.363747142Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 10:38:21.367740 env[1217]: time="2025-05-15T10:38:21.363760768Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 10:38:21.367740 env[1217]: time="2025-05-15T10:38:21.364408703Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 10:38:21.367740 env[1217]: time="2025-05-15T10:38:21.364931654Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 10:38:21.364283 systemd[1]: Finished extend-filesystems.service. May 15 10:38:21.368215 env[1217]: time="2025-05-15T10:38:21.365874593Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 10:38:21.368215 env[1217]: time="2025-05-15T10:38:21.365918164Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 10:38:21.368215 env[1217]: time="2025-05-15T10:38:21.365934906Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 10:38:21.368215 env[1217]: time="2025-05-15T10:38:21.366008333Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 10:38:21.368215 env[1217]: time="2025-05-15T10:38:21.366021428Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 10:38:21.368215 env[1217]: time="2025-05-15T10:38:21.366033350Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 10:38:21.368215 env[1217]: time="2025-05-15T10:38:21.366043469Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 10:38:21.368215 env[1217]: time="2025-05-15T10:38:21.366116817Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 10:38:21.368215 env[1217]: time="2025-05-15T10:38:21.366145050Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 10:38:21.368215 env[1217]: time="2025-05-15T10:38:21.366156401Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 10:38:21.368215 env[1217]: time="2025-05-15T10:38:21.366167823Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 10:38:21.368215 env[1217]: time="2025-05-15T10:38:21.366179334Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 10:38:21.368215 env[1217]: time="2025-05-15T10:38:21.366315660Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 10:38:21.368215 env[1217]: time="2025-05-15T10:38:21.366331319Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 10:38:21.368215 env[1217]: time="2025-05-15T10:38:21.366342721Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 10:38:21.368579 env[1217]: time="2025-05-15T10:38:21.366353952Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 10:38:21.368579 env[1217]: time="2025-05-15T10:38:21.366398966Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 10:38:21.368579 env[1217]: time="2025-05-15T10:38:21.366409626Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 10:38:21.368579 env[1217]: time="2025-05-15T10:38:21.366426187Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 10:38:21.368579 env[1217]: time="2025-05-15T10:38:21.366476882Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 10:38:21.368615 systemd[1]: Started containerd.service. May 15 10:38:21.369495 env[1217]: time="2025-05-15T10:38:21.366692948Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 10:38:21.369495 env[1217]: time="2025-05-15T10:38:21.366743032Z" level=info msg="Connect containerd service" May 15 10:38:21.369495 env[1217]: time="2025-05-15T10:38:21.366781053Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 10:38:21.369495 env[1217]: time="2025-05-15T10:38:21.367433517Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:38:21.369495 env[1217]: time="2025-05-15T10:38:21.367987095Z" level=info msg="Start subscribing containerd event" May 15 10:38:21.369495 env[1217]: time="2025-05-15T10:38:21.368048230Z" level=info msg="Start recovering state" May 15 10:38:21.369495 env[1217]: time="2025-05-15T10:38:21.368097172Z" level=info msg="Start event monitor" May 15 10:38:21.369495 env[1217]: time="2025-05-15T10:38:21.368110937Z" level=info msg="Start snapshots syncer" May 15 10:38:21.369495 env[1217]: time="2025-05-15T10:38:21.368118772Z" level=info msg="Start cni network conf syncer for default" May 15 10:38:21.369495 env[1217]: time="2025-05-15T10:38:21.368125845Z" level=info msg="Start streaming server" May 15 10:38:21.369495 env[1217]: time="2025-05-15T10:38:21.368464000Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 10:38:21.369495 env[1217]: time="2025-05-15T10:38:21.368496661Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 10:38:21.370488 env[1217]: time="2025-05-15T10:38:21.370439866Z" level=info msg="containerd successfully booted in 0.099838s" May 15 10:38:21.397802 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:21.397861 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:21.729234 tar[1214]: linux-amd64/README.md May 15 10:38:21.734281 systemd[1]: Finished prepare-helm.service. May 15 10:38:21.771056 sshd_keygen[1208]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 10:38:21.790826 systemd[1]: Finished sshd-keygen.service. May 15 10:38:21.793041 systemd[1]: Starting issuegen.service... May 15 10:38:21.799426 systemd[1]: issuegen.service: Deactivated successfully. May 15 10:38:21.799559 systemd[1]: Finished issuegen.service. May 15 10:38:21.801662 systemd[1]: Starting systemd-user-sessions.service... May 15 10:38:21.808345 systemd[1]: Finished systemd-user-sessions.service. May 15 10:38:21.810913 systemd[1]: Started getty@tty1.service. May 15 10:38:21.812914 systemd[1]: Started serial-getty@ttyS0.service. May 15 10:38:21.814003 systemd[1]: Reached target getty.target. May 15 10:38:22.084989 systemd[1]: Started kubelet.service. May 15 10:38:22.086656 systemd[1]: Reached target multi-user.target. May 15 10:38:22.089122 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 10:38:22.097148 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 10:38:22.097277 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 10:38:22.098444 systemd[1]: Startup finished in 930ms (kernel) + 4.394s (initrd) + 5.185s (userspace) = 10.511s. May 15 10:38:22.597639 kubelet[1271]: E0515 10:38:22.597580 1271 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:38:22.599229 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:38:22.599353 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:38:22.599570 systemd[1]: kubelet.service: Consumed 1.137s CPU time. May 15 10:38:25.034210 systemd[1]: Created slice system-sshd.slice. May 15 10:38:25.035780 systemd[1]: Started sshd@0-10.0.0.52:22-10.0.0.1:50644.service. May 15 10:38:25.077155 sshd[1280]: Accepted publickey for core from 10.0.0.1 port 50644 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:38:25.078595 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:25.086334 systemd[1]: Created slice user-500.slice. May 15 10:38:25.087481 systemd[1]: Starting user-runtime-dir@500.service... May 15 10:38:25.089189 systemd-logind[1201]: New session 1 of user core. May 15 10:38:25.094896 systemd[1]: Finished user-runtime-dir@500.service. May 15 10:38:25.096104 systemd[1]: Starting user@500.service... May 15 10:38:25.098823 (systemd)[1283]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:25.165023 systemd[1283]: Queued start job for default target default.target. May 15 10:38:25.165469 systemd[1283]: Reached target paths.target. May 15 10:38:25.165489 systemd[1283]: Reached target sockets.target. May 15 10:38:25.165500 systemd[1283]: Reached target timers.target. May 15 10:38:25.165511 systemd[1283]: Reached target basic.target. May 15 10:38:25.165545 systemd[1283]: Reached target default.target. May 15 10:38:25.165567 systemd[1283]: Startup finished in 60ms. May 15 10:38:25.165628 systemd[1]: Started user@500.service. May 15 10:38:25.166561 systemd[1]: Started session-1.scope. May 15 10:38:25.218816 systemd[1]: Started sshd@1-10.0.0.52:22-10.0.0.1:50646.service. May 15 10:38:25.257317 sshd[1292]: Accepted publickey for core from 10.0.0.1 port 50646 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:38:25.258616 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:25.262216 systemd-logind[1201]: New session 2 of user core. May 15 10:38:25.263269 systemd[1]: Started session-2.scope. May 15 10:38:25.315336 sshd[1292]: pam_unix(sshd:session): session closed for user core May 15 10:38:25.318077 systemd[1]: sshd@1-10.0.0.52:22-10.0.0.1:50646.service: Deactivated successfully. May 15 10:38:25.318607 systemd[1]: session-2.scope: Deactivated successfully. May 15 10:38:25.319095 systemd-logind[1201]: Session 2 logged out. Waiting for processes to exit. May 15 10:38:25.320149 systemd[1]: Started sshd@2-10.0.0.52:22-10.0.0.1:50662.service. May 15 10:38:25.320771 systemd-logind[1201]: Removed session 2. May 15 10:38:25.358736 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 50662 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:38:25.359773 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:25.363305 systemd-logind[1201]: New session 3 of user core. May 15 10:38:25.364308 systemd[1]: Started session-3.scope. May 15 10:38:25.414157 sshd[1298]: pam_unix(sshd:session): session closed for user core May 15 10:38:25.417193 systemd[1]: sshd@2-10.0.0.52:22-10.0.0.1:50662.service: Deactivated successfully. May 15 10:38:25.417720 systemd[1]: session-3.scope: Deactivated successfully. May 15 10:38:25.418169 systemd-logind[1201]: Session 3 logged out. Waiting for processes to exit. May 15 10:38:25.419236 systemd[1]: Started sshd@3-10.0.0.52:22-10.0.0.1:50674.service. May 15 10:38:25.419859 systemd-logind[1201]: Removed session 3. May 15 10:38:25.456153 sshd[1305]: Accepted publickey for core from 10.0.0.1 port 50674 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:38:25.457511 sshd[1305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:25.461266 systemd-logind[1201]: New session 4 of user core. May 15 10:38:25.462338 systemd[1]: Started session-4.scope. May 15 10:38:25.516161 sshd[1305]: pam_unix(sshd:session): session closed for user core May 15 10:38:25.518534 systemd[1]: sshd@3-10.0.0.52:22-10.0.0.1:50674.service: Deactivated successfully. May 15 10:38:25.519017 systemd[1]: session-4.scope: Deactivated successfully. May 15 10:38:25.519515 systemd-logind[1201]: Session 4 logged out. Waiting for processes to exit. May 15 10:38:25.520448 systemd[1]: Started sshd@4-10.0.0.52:22-10.0.0.1:50684.service. May 15 10:38:25.521169 systemd-logind[1201]: Removed session 4. May 15 10:38:25.557271 sshd[1311]: Accepted publickey for core from 10.0.0.1 port 50684 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:38:25.558387 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:25.561744 systemd-logind[1201]: New session 5 of user core. May 15 10:38:25.562493 systemd[1]: Started session-5.scope. May 15 10:38:25.617196 sudo[1314]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 10:38:25.617425 sudo[1314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:38:25.623595 dbus-daemon[1190]: \xd0\u000dO\xa7\xb8U: received setenforce notice (enforcing=877090256) May 15 10:38:25.626186 sudo[1314]: pam_unix(sudo:session): session closed for user root May 15 10:38:25.627537 sshd[1311]: pam_unix(sshd:session): session closed for user core May 15 10:38:25.630862 systemd[1]: sshd@4-10.0.0.52:22-10.0.0.1:50684.service: Deactivated successfully. May 15 10:38:25.631571 systemd[1]: session-5.scope: Deactivated successfully. May 15 10:38:25.632131 systemd-logind[1201]: Session 5 logged out. Waiting for processes to exit. May 15 10:38:25.633522 systemd[1]: Started sshd@5-10.0.0.52:22-10.0.0.1:50696.service. May 15 10:38:25.634222 systemd-logind[1201]: Removed session 5. May 15 10:38:25.670317 sshd[1318]: Accepted publickey for core from 10.0.0.1 port 50696 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:38:25.671408 sshd[1318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:25.674758 systemd-logind[1201]: New session 6 of user core. May 15 10:38:25.675881 systemd[1]: Started session-6.scope. May 15 10:38:25.727964 sudo[1322]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 10:38:25.728157 sudo[1322]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:38:25.730850 sudo[1322]: pam_unix(sudo:session): session closed for user root May 15 10:38:25.735121 sudo[1321]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 10:38:25.735327 sudo[1321]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:38:25.744613 systemd[1]: Stopping audit-rules.service... May 15 10:38:25.744000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:38:25.745486 auditctl[1325]: No rules May 15 10:38:25.746508 systemd[1]: audit-rules.service: Deactivated successfully. May 15 10:38:25.746683 systemd[1]: Stopped audit-rules.service. May 15 10:38:25.752438 kernel: kauditd_printk_skb: 265 callbacks suppressed May 15 10:38:25.752532 kernel: audit: type=1305 audit(1747305505.744:204): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:38:25.752551 kernel: audit: type=1300 audit(1747305505.744:204): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdef099bc0 a2=420 a3=0 items=0 ppid=1 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:25.744000 audit[1325]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdef099bc0 a2=420 a3=0 items=0 ppid=1 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:25.748303 systemd[1]: Starting audit-rules.service... May 15 10:38:25.755400 kernel: audit: type=1327 audit(1747305505.744:204): proctitle=2F7362696E2F617564697463746C002D44 May 15 10:38:25.755448 kernel: audit: type=1131 audit(1747305505.745:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:25.744000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 10:38:25.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:25.767939 augenrules[1342]: No rules May 15 10:38:25.768545 systemd[1]: Finished audit-rules.service. May 15 10:38:25.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:25.769319 sudo[1321]: pam_unix(sudo:session): session closed for user root May 15 10:38:25.771179 sshd[1318]: pam_unix(sshd:session): session closed for user core May 15 10:38:25.767000 audit[1321]: USER_END pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:25.773612 systemd[1]: sshd@5-10.0.0.52:22-10.0.0.1:50696.service: Deactivated successfully. May 15 10:38:25.775511 kernel: audit: type=1130 audit(1747305505.767:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:25.775532 kernel: audit: type=1106 audit(1747305505.767:207): pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:25.775582 kernel: audit: type=1104 audit(1747305505.768:208): pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:25.768000 audit[1321]: CRED_DISP pid=1321 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:25.774265 systemd[1]: session-6.scope: Deactivated successfully. May 15 10:38:25.774841 systemd-logind[1201]: Session 6 logged out. Waiting for processes to exit. May 15 10:38:25.776195 systemd[1]: Started sshd@6-10.0.0.52:22-10.0.0.1:50700.service. May 15 10:38:25.777435 systemd-logind[1201]: Removed session 6. May 15 10:38:25.770000 audit[1318]: USER_END pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:25.782792 kernel: audit: type=1106 audit(1747305505.770:209): pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:25.782835 kernel: audit: type=1104 audit(1747305505.770:210): pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:25.770000 audit[1318]: CRED_DISP pid=1318 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:25.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.52:22-10.0.0.1:50696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:25.789423 kernel: audit: type=1131 audit(1747305505.772:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.52:22-10.0.0.1:50696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:25.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.52:22-10.0.0.1:50700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:25.819000 audit[1348]: USER_ACCT pid=1348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:25.820901 sshd[1348]: Accepted publickey for core from 10.0.0.1 port 50700 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:38:25.820000 audit[1348]: CRED_ACQ pid=1348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:25.820000 audit[1348]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca8a72cb0 a2=3 a3=0 items=0 ppid=1 pid=1348 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:25.820000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:38:25.822257 sshd[1348]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:25.826165 systemd-logind[1201]: New session 7 of user core. May 15 10:38:25.826915 systemd[1]: Started session-7.scope. May 15 10:38:25.829000 audit[1348]: USER_START pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:25.831000 audit[1350]: CRED_ACQ pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:25.878000 audit[1351]: USER_ACCT pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:25.878000 audit[1351]: CRED_REFR pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:25.879810 sudo[1351]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 10:38:25.880013 sudo[1351]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:38:25.880000 audit[1351]: USER_START pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:25.904010 systemd[1]: Starting docker.service... May 15 10:38:25.941404 env[1363]: time="2025-05-15T10:38:25.941323928Z" level=info msg="Starting up" May 15 10:38:25.942788 env[1363]: time="2025-05-15T10:38:25.942737219Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:38:25.942788 env[1363]: time="2025-05-15T10:38:25.942755132Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:38:25.942788 env[1363]: time="2025-05-15T10:38:25.942771814Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:38:25.942788 env[1363]: time="2025-05-15T10:38:25.942780670Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:38:25.944409 env[1363]: time="2025-05-15T10:38:25.944378998Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:38:25.944409 env[1363]: time="2025-05-15T10:38:25.944396972Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:38:25.944409 env[1363]: time="2025-05-15T10:38:25.944410808Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:38:25.944526 env[1363]: time="2025-05-15T10:38:25.944420546Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:38:26.598886 env[1363]: time="2025-05-15T10:38:26.598827126Z" level=info msg="Loading containers: start." May 15 10:38:26.648000 audit[1397]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.648000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff9b49e0d0 a2=0 a3=7fff9b49e0bc items=0 ppid=1363 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.648000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 15 10:38:26.650000 audit[1399]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.650000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc3a0011d0 a2=0 a3=7ffc3a0011bc items=0 ppid=1363 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.650000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 15 10:38:26.652000 audit[1401]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.652000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd16570870 a2=0 a3=7ffd1657085c items=0 ppid=1363 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.652000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:38:26.653000 audit[1403]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.653000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff66752350 a2=0 a3=7fff6675233c items=0 ppid=1363 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.653000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:38:26.655000 audit[1405]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.655000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff12483080 a2=0 a3=7fff1248306c items=0 ppid=1363 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.655000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 15 10:38:26.678000 audit[1410]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.678000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdff851ad0 a2=0 a3=7ffdff851abc items=0 ppid=1363 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.678000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 15 10:38:26.687000 audit[1412]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.687000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc97ecdcd0 a2=0 a3=7ffc97ecdcbc items=0 ppid=1363 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.687000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 15 10:38:26.689000 audit[1414]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.689000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc9fbe5e20 a2=0 a3=7ffc9fbe5e0c items=0 ppid=1363 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.689000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 15 10:38:26.691000 audit[1416]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.691000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd89ab0fa0 a2=0 a3=7ffd89ab0f8c items=0 ppid=1363 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.691000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:38:26.700000 audit[1420]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.700000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffce989fbc0 a2=0 a3=7ffce989fbac items=0 ppid=1363 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.700000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:38:26.709000 audit[1421]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.709000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdab559110 a2=0 a3=7ffdab5590fc items=0 ppid=1363 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.709000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:38:26.719420 kernel: Initializing XFRM netlink socket May 15 10:38:26.745894 env[1363]: time="2025-05-15T10:38:26.745862222Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 15 10:38:26.760000 audit[1429]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.760000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff7c425dd0 a2=0 a3=7fff7c425dbc items=0 ppid=1363 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.760000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 15 10:38:26.770000 audit[1432]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.770000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe5afc46d0 a2=0 a3=7ffe5afc46bc items=0 ppid=1363 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.770000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 15 10:38:26.772000 audit[1435]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.772000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd7aa18a00 a2=0 a3=7ffd7aa189ec items=0 ppid=1363 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.772000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 15 10:38:26.774000 audit[1437]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.774000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffee58bb000 a2=0 a3=7ffee58bafec items=0 ppid=1363 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.774000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 15 10:38:26.776000 audit[1439]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.776000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffcc2e3e800 a2=0 a3=7ffcc2e3e7ec items=0 ppid=1363 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.776000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 15 10:38:26.777000 audit[1441]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.777000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffdf1ebc3e0 a2=0 a3=7ffdf1ebc3cc items=0 ppid=1363 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.777000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 15 10:38:26.779000 audit[1443]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.779000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe91274b70 a2=0 a3=7ffe91274b5c items=0 ppid=1363 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.779000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 15 10:38:26.785000 audit[1446]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.785000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff58868940 a2=0 a3=7fff5886892c items=0 ppid=1363 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.785000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 15 10:38:26.787000 audit[1448]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.787000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd2ec87350 a2=0 a3=7ffd2ec8733c items=0 ppid=1363 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.787000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:38:26.789000 audit[1450]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.789000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc7c16b2c0 a2=0 a3=7ffc7c16b2ac items=0 ppid=1363 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.789000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:38:26.790000 audit[1452]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.790000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd72bf8950 a2=0 a3=7ffd72bf893c items=0 ppid=1363 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.790000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 15 10:38:26.792457 systemd-networkd[1039]: docker0: Link UP May 15 10:38:26.798000 audit[1456]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.798000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd854b3c90 a2=0 a3=7ffd854b3c7c items=0 ppid=1363 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.798000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:38:26.809000 audit[1457]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:26.809000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff32731190 a2=0 a3=7fff3273117c items=0 ppid=1363 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:26.809000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:38:26.811593 env[1363]: time="2025-05-15T10:38:26.811560593Z" level=info msg="Loading containers: done." May 15 10:38:26.819749 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4038484951-merged.mount: Deactivated successfully. May 15 10:38:26.827095 env[1363]: time="2025-05-15T10:38:26.827050448Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 15 10:38:26.827241 env[1363]: time="2025-05-15T10:38:26.827217020Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 15 10:38:26.827333 env[1363]: time="2025-05-15T10:38:26.827310966Z" level=info msg="Daemon has completed initialization" May 15 10:38:26.844198 systemd[1]: Started docker.service. May 15 10:38:26.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:26.851486 env[1363]: time="2025-05-15T10:38:26.851383159Z" level=info msg="API listen on /run/docker.sock" May 15 10:38:27.735314 env[1217]: time="2025-05-15T10:38:27.735265109Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\"" May 15 10:38:28.233172 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount998987917.mount: Deactivated successfully. May 15 10:38:29.557948 env[1217]: time="2025-05-15T10:38:29.557871587Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:29.559908 env[1217]: time="2025-05-15T10:38:29.559847243Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:29.561599 env[1217]: time="2025-05-15T10:38:29.561564164Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:29.563342 env[1217]: time="2025-05-15T10:38:29.563303476Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:631c6cc78b2862be4fed7df3384a643ef7297eebadae22e8ef9cbe2e19b6386f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:29.563991 env[1217]: time="2025-05-15T10:38:29.563964326Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\" returns image reference \"sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5\"" May 15 10:38:29.564543 env[1217]: time="2025-05-15T10:38:29.564508446Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\"" May 15 10:38:31.023292 env[1217]: time="2025-05-15T10:38:31.023237365Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:31.025350 env[1217]: time="2025-05-15T10:38:31.025296317Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:31.029239 env[1217]: time="2025-05-15T10:38:31.029207603Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:31.030824 env[1217]: time="2025-05-15T10:38:31.030791905Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:25e29187ea66f0ff9b9a00114849c3a30b649005c900a8b2a69e3f3fa56448fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:31.031438 env[1217]: time="2025-05-15T10:38:31.031405025Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\" returns image reference \"sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a\"" May 15 10:38:31.032225 env[1217]: time="2025-05-15T10:38:31.032187172Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\"" May 15 10:38:32.668057 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 10:38:32.676519 kernel: kauditd_printk_skb: 84 callbacks suppressed May 15 10:38:32.676570 kernel: audit: type=1130 audit(1747305512.666:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:32.676598 kernel: audit: type=1131 audit(1747305512.666:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:32.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:32.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:32.668304 systemd[1]: Stopped kubelet.service. May 15 10:38:32.668386 systemd[1]: kubelet.service: Consumed 1.137s CPU time. May 15 10:38:32.669963 systemd[1]: Starting kubelet.service... May 15 10:38:32.761679 systemd[1]: Started kubelet.service. May 15 10:38:32.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:32.767419 kernel: audit: type=1130 audit(1747305512.760:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:32.805237 kubelet[1498]: E0515 10:38:32.805167 1498 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:38:32.808314 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:38:32.808483 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:38:32.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:38:32.812401 kernel: audit: type=1131 audit(1747305512.807:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:38:33.124702 env[1217]: time="2025-05-15T10:38:33.124545007Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:33.127039 env[1217]: time="2025-05-15T10:38:33.126972461Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:33.130678 env[1217]: time="2025-05-15T10:38:33.130651722Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:33.132389 env[1217]: time="2025-05-15T10:38:33.132347923Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09c55f8dac59a4b8e5e354140f5a4bdd6fa9bd95c42d6bcba6782ed37c31b5a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:33.133041 env[1217]: time="2025-05-15T10:38:33.133015676Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\" returns image reference \"sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000\"" May 15 10:38:33.133591 env[1217]: time="2025-05-15T10:38:33.133533437Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 15 10:38:34.089628 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount929755997.mount: Deactivated successfully. May 15 10:38:35.003228 env[1217]: time="2025-05-15T10:38:35.003118304Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:35.006230 env[1217]: time="2025-05-15T10:38:35.006033702Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:35.008047 env[1217]: time="2025-05-15T10:38:35.007988679Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:35.009315 env[1217]: time="2025-05-15T10:38:35.009262328Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:35.009597 env[1217]: time="2025-05-15T10:38:35.009563674Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3\"" May 15 10:38:35.010169 env[1217]: time="2025-05-15T10:38:35.010139814Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 15 10:38:35.478418 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount60063522.mount: Deactivated successfully. May 15 10:38:36.386980 env[1217]: time="2025-05-15T10:38:36.386909931Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:36.388697 env[1217]: time="2025-05-15T10:38:36.388663971Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:36.390767 env[1217]: time="2025-05-15T10:38:36.390710049Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:36.392477 env[1217]: time="2025-05-15T10:38:36.392439724Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:36.393269 env[1217]: time="2025-05-15T10:38:36.393217923Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 15 10:38:36.393900 env[1217]: time="2025-05-15T10:38:36.393864566Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 15 10:38:36.826037 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2994424657.mount: Deactivated successfully. May 15 10:38:36.831858 env[1217]: time="2025-05-15T10:38:36.831802603Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:36.833659 env[1217]: time="2025-05-15T10:38:36.833608520Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:36.834994 env[1217]: time="2025-05-15T10:38:36.834960576Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:36.836703 env[1217]: time="2025-05-15T10:38:36.836670694Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:36.837269 env[1217]: time="2025-05-15T10:38:36.837234462Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 15 10:38:36.837894 env[1217]: time="2025-05-15T10:38:36.837857330Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 15 10:38:37.428668 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1729111227.mount: Deactivated successfully. May 15 10:38:40.522157 env[1217]: time="2025-05-15T10:38:40.522003535Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:40.523897 env[1217]: time="2025-05-15T10:38:40.523868293Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:40.525798 env[1217]: time="2025-05-15T10:38:40.525740525Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:40.527614 env[1217]: time="2025-05-15T10:38:40.527582089Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:40.528352 env[1217]: time="2025-05-15T10:38:40.528308742Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" May 15 10:38:42.917893 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 10:38:42.918102 systemd[1]: Stopped kubelet.service. May 15 10:38:42.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.919696 systemd[1]: Starting kubelet.service... May 15 10:38:42.926516 kernel: audit: type=1130 audit(1747305522.916:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.926626 kernel: audit: type=1131 audit(1747305522.916:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:43.008694 systemd[1]: Started kubelet.service. May 15 10:38:43.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:43.013403 kernel: audit: type=1130 audit(1747305523.007:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:43.049409 kubelet[1529]: E0515 10:38:43.049326 1529 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:38:43.051238 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:38:43.051399 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:38:43.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:38:43.056395 kernel: audit: type=1131 audit(1747305523.050:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:38:43.096249 systemd[1]: Stopped kubelet.service. May 15 10:38:43.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:43.098215 systemd[1]: Starting kubelet.service... May 15 10:38:43.103306 kernel: audit: type=1130 audit(1747305523.094:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:43.103390 kernel: audit: type=1131 audit(1747305523.095:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:43.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:43.117810 systemd[1]: Reloading. May 15 10:38:43.195909 /usr/lib/systemd/system-generators/torcx-generator[1563]: time="2025-05-15T10:38:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:38:43.195943 /usr/lib/systemd/system-generators/torcx-generator[1563]: time="2025-05-15T10:38:43Z" level=info msg="torcx already run" May 15 10:38:43.744058 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:38:43.744081 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:38:43.761050 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:38:43.829910 kernel: audit: type=1400 audit(1747305523.818:256): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.829999 kernel: audit: type=1400 audit(1747305523.818:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.830042 kernel: audit: type=1400 audit(1747305523.818:258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.833626 kernel: audit: type=1400 audit(1747305523.818:259): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.825000 audit: BPF prog-id=43 op=LOAD May 15 10:38:43.825000 audit: BPF prog-id=38 op=UNLOAD May 15 10:38:43.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.828000 audit: BPF prog-id=44 op=LOAD May 15 10:38:43.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.828000 audit: BPF prog-id=45 op=LOAD May 15 10:38:43.828000 audit: BPF prog-id=39 op=UNLOAD May 15 10:38:43.828000 audit: BPF prog-id=40 op=UNLOAD May 15 10:38:43.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.832000 audit: BPF prog-id=46 op=LOAD May 15 10:38:43.832000 audit: BPF prog-id=27 op=UNLOAD May 15 10:38:43.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.833000 audit: BPF prog-id=47 op=LOAD May 15 10:38:43.833000 audit: BPF prog-id=41 op=UNLOAD May 15 10:38:43.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit: BPF prog-id=48 op=LOAD May 15 10:38:43.835000 audit: BPF prog-id=28 op=UNLOAD May 15 10:38:43.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit: BPF prog-id=49 op=LOAD May 15 10:38:43.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit: BPF prog-id=50 op=LOAD May 15 10:38:43.836000 audit: BPF prog-id=29 op=UNLOAD May 15 10:38:43.836000 audit: BPF prog-id=30 op=UNLOAD May 15 10:38:43.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit: BPF prog-id=51 op=LOAD May 15 10:38:43.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.836000 audit: BPF prog-id=52 op=LOAD May 15 10:38:43.836000 audit: BPF prog-id=31 op=UNLOAD May 15 10:38:43.836000 audit: BPF prog-id=32 op=UNLOAD May 15 10:38:43.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit: BPF prog-id=53 op=LOAD May 15 10:38:43.837000 audit: BPF prog-id=36 op=UNLOAD May 15 10:38:43.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit: BPF prog-id=54 op=LOAD May 15 10:38:43.838000 audit: BPF prog-id=33 op=UNLOAD May 15 10:38:43.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit: BPF prog-id=55 op=LOAD May 15 10:38:43.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.838000 audit: BPF prog-id=56 op=LOAD May 15 10:38:43.838000 audit: BPF prog-id=34 op=UNLOAD May 15 10:38:43.838000 audit: BPF prog-id=35 op=UNLOAD May 15 10:38:43.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:43.839000 audit: BPF prog-id=57 op=LOAD May 15 10:38:43.839000 audit: BPF prog-id=37 op=UNLOAD May 15 10:38:43.850558 systemd[1]: Started kubelet.service. May 15 10:38:43.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:43.852094 systemd[1]: Stopping kubelet.service... May 15 10:38:43.852327 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:38:43.852528 systemd[1]: Stopped kubelet.service. May 15 10:38:43.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:43.853856 systemd[1]: Starting kubelet.service... May 15 10:38:43.940052 systemd[1]: Started kubelet.service. May 15 10:38:43.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:43.974879 kubelet[1611]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:38:43.974879 kubelet[1611]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 15 10:38:43.974879 kubelet[1611]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:38:43.975260 kubelet[1611]: I0515 10:38:43.974971 1611 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:38:44.303695 kubelet[1611]: I0515 10:38:44.303649 1611 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 15 10:38:44.303695 kubelet[1611]: I0515 10:38:44.303682 1611 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:38:44.303975 kubelet[1611]: I0515 10:38:44.303944 1611 server.go:954] "Client rotation is on, will bootstrap in background" May 15 10:38:44.330143 kubelet[1611]: E0515 10:38:44.330081 1611 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.52:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.52:6443: connect: connection refused" logger="UnhandledError" May 15 10:38:44.331080 kubelet[1611]: I0515 10:38:44.331053 1611 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:38:44.338893 kubelet[1611]: E0515 10:38:44.338836 1611 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 10:38:44.338893 kubelet[1611]: I0515 10:38:44.338878 1611 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 10:38:44.342981 kubelet[1611]: I0515 10:38:44.342939 1611 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:38:44.344110 kubelet[1611]: I0515 10:38:44.344073 1611 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:38:44.344269 kubelet[1611]: I0515 10:38:44.344106 1611 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 10:38:44.344381 kubelet[1611]: I0515 10:38:44.344273 1611 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:38:44.344381 kubelet[1611]: I0515 10:38:44.344281 1611 container_manager_linux.go:304] "Creating device plugin manager" May 15 10:38:44.344428 kubelet[1611]: I0515 10:38:44.344417 1611 state_mem.go:36] "Initialized new in-memory state store" May 15 10:38:44.347103 kubelet[1611]: I0515 10:38:44.347081 1611 kubelet.go:446] "Attempting to sync node with API server" May 15 10:38:44.347103 kubelet[1611]: I0515 10:38:44.347099 1611 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:38:44.347157 kubelet[1611]: I0515 10:38:44.347115 1611 kubelet.go:352] "Adding apiserver pod source" May 15 10:38:44.347157 kubelet[1611]: I0515 10:38:44.347125 1611 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:38:44.360520 kubelet[1611]: I0515 10:38:44.360497 1611 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:38:44.360747 kubelet[1611]: W0515 10:38:44.360685 1611 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.52:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.52:6443: connect: connection refused May 15 10:38:44.360793 kubelet[1611]: E0515 10:38:44.360761 1611 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.52:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.52:6443: connect: connection refused" logger="UnhandledError" May 15 10:38:44.360998 kubelet[1611]: I0515 10:38:44.360978 1611 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:38:44.361062 kubelet[1611]: W0515 10:38:44.361039 1611 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 10:38:44.362064 kubelet[1611]: W0515 10:38:44.362010 1611 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.52:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.52:6443: connect: connection refused May 15 10:38:44.362064 kubelet[1611]: E0515 10:38:44.362052 1611 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.52:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.52:6443: connect: connection refused" logger="UnhandledError" May 15 10:38:44.368981 kubelet[1611]: I0515 10:38:44.368942 1611 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 15 10:38:44.368981 kubelet[1611]: I0515 10:38:44.368994 1611 server.go:1287] "Started kubelet" May 15 10:38:44.372466 kubelet[1611]: I0515 10:38:44.372425 1611 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:38:44.373000 audit[1611]: AVC avc: denied { mac_admin } for pid=1611 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:44.373000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:38:44.373000 audit[1611]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cd3320 a1=c000cd5b18 a2=c000cd32f0 a3=25 items=0 ppid=1 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:44.373000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:38:44.373000 audit[1611]: AVC avc: denied { mac_admin } for pid=1611 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:44.373000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:38:44.373000 audit[1611]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ce3540 a1=c000cd5b48 a2=c000cd3590 a3=25 items=0 ppid=1 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:44.373000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:38:44.375176 kubelet[1611]: I0515 10:38:44.374668 1611 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:38:44.375176 kubelet[1611]: I0515 10:38:44.374712 1611 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 15 10:38:44.375176 kubelet[1611]: I0515 10:38:44.374784 1611 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:38:44.375295 kubelet[1611]: I0515 10:38:44.375248 1611 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 10:38:44.377014 kubelet[1611]: I0515 10:38:44.376987 1611 volume_manager.go:297] "Starting Kubelet Volume Manager" May 15 10:38:44.377125 kubelet[1611]: E0515 10:38:44.377101 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:44.377713 kubelet[1611]: I0515 10:38:44.377682 1611 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 10:38:44.377792 kubelet[1611]: I0515 10:38:44.377750 1611 reconciler.go:26] "Reconciler: start to sync state" May 15 10:38:44.378162 kubelet[1611]: I0515 10:38:44.378134 1611 server.go:490] "Adding debug handlers to kubelet server" May 15 10:38:44.378387 kubelet[1611]: I0515 10:38:44.378320 1611 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:38:44.379455 kubelet[1611]: I0515 10:38:44.378873 1611 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:38:44.379455 kubelet[1611]: E0515 10:38:44.379046 1611 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.52:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.52:6443: connect: connection refused" interval="200ms" May 15 10:38:44.379455 kubelet[1611]: W0515 10:38:44.379049 1611 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.52:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.52:6443: connect: connection refused May 15 10:38:44.379455 kubelet[1611]: E0515 10:38:44.379095 1611 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.52:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.52:6443: connect: connection refused" logger="UnhandledError" May 15 10:38:44.379455 kubelet[1611]: I0515 10:38:44.379236 1611 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:38:44.381120 kubelet[1611]: E0515 10:38:44.379830 1611 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.52:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.52:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183fad1de616ff0a default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 10:38:44.368965386 +0000 UTC m=+0.425506199,LastTimestamp:2025-05-15 10:38:44.368965386 +0000 UTC m=+0.425506199,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 10:38:44.381767 kubelet[1611]: E0515 10:38:44.381737 1611 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:38:44.381928 kubelet[1611]: I0515 10:38:44.381902 1611 factory.go:221] Registration of the containerd container factory successfully May 15 10:38:44.381928 kubelet[1611]: I0515 10:38:44.381916 1611 factory.go:221] Registration of the systemd container factory successfully May 15 10:38:44.382000 audit[1624]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1624 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:44.382000 audit[1624]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffe95dc800 a2=0 a3=7fffe95dc7ec items=0 ppid=1611 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:44.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:38:44.383000 audit[1625]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:44.383000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7d4a0a20 a2=0 a3=7ffe7d4a0a0c items=0 ppid=1611 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:44.383000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:38:44.384000 audit[1627]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:44.384000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffef7071c40 a2=0 a3=7ffef7071c2c items=0 ppid=1611 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:44.384000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:38:44.386000 audit[1629]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:44.386000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcf0b1c080 a2=0 a3=7ffcf0b1c06c items=0 ppid=1611 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:44.386000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:38:44.392635 kubelet[1611]: I0515 10:38:44.392608 1611 cpu_manager.go:221] "Starting CPU manager" policy="none" May 15 10:38:44.392635 kubelet[1611]: I0515 10:38:44.392621 1611 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 15 10:38:44.392816 kubelet[1611]: I0515 10:38:44.392653 1611 state_mem.go:36] "Initialized new in-memory state store" May 15 10:38:44.393000 audit[1634]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1634 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:44.393000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe41ce9790 a2=0 a3=7ffe41ce977c items=0 ppid=1611 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:44.393000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 10:38:44.395449 kubelet[1611]: I0515 10:38:44.395324 1611 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:38:44.394000 audit[1638]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1638 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:44.394000 audit[1638]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe34c164b0 a2=0 a3=7ffe34c1649c items=0 ppid=1611 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:44.394000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:38:44.395000 audit[1640]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1640 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:44.395000 audit[1640]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1ba4f760 a2=0 a3=7ffc1ba4f74c items=0 ppid=1611 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:44.395000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:38:44.396731 kubelet[1611]: I0515 10:38:44.396682 1611 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:38:44.396731 kubelet[1611]: I0515 10:38:44.396699 1611 status_manager.go:227] "Starting to sync pod status with apiserver" May 15 10:38:44.396731 kubelet[1611]: I0515 10:38:44.396724 1611 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 15 10:38:44.396731 kubelet[1611]: I0515 10:38:44.396732 1611 kubelet.go:2388] "Starting kubelet main sync loop" May 15 10:38:44.396829 kubelet[1611]: E0515 10:38:44.396775 1611 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:38:44.397298 kubelet[1611]: W0515 10:38:44.397270 1611 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.52:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.52:6443: connect: connection refused May 15 10:38:44.397347 kubelet[1611]: E0515 10:38:44.397304 1611 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.52:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.52:6443: connect: connection refused" logger="UnhandledError" May 15 10:38:44.396000 audit[1641]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1641 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:44.396000 audit[1641]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd19911860 a2=0 a3=7ffd1991184c items=0 ppid=1611 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:44.396000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:38:44.396000 audit[1642]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:44.396000 audit[1642]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcec97fca0 a2=0 a3=7ffcec97fc8c items=0 ppid=1611 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:44.396000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:38:44.397000 audit[1643]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:44.397000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffffd91d710 a2=0 a3=7ffffd91d6fc items=0 ppid=1611 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:44.397000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:38:44.398000 audit[1644]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:44.398000 audit[1644]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffceeb1ed00 a2=0 a3=7ffceeb1ecec items=0 ppid=1611 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:44.398000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:38:44.398000 audit[1645]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:44.398000 audit[1645]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcefbbfe70 a2=0 a3=7ffcefbbfe5c items=0 ppid=1611 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:44.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:38:44.478042 kubelet[1611]: E0515 10:38:44.478007 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:44.497244 kubelet[1611]: E0515 10:38:44.497203 1611 kubelet.go:2412] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 15 10:38:44.578551 kubelet[1611]: E0515 10:38:44.578394 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:44.580059 kubelet[1611]: E0515 10:38:44.580008 1611 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.52:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.52:6443: connect: connection refused" interval="400ms" May 15 10:38:44.654925 kubelet[1611]: I0515 10:38:44.654875 1611 policy_none.go:49] "None policy: Start" May 15 10:38:44.654925 kubelet[1611]: I0515 10:38:44.654924 1611 memory_manager.go:186] "Starting memorymanager" policy="None" May 15 10:38:44.655003 kubelet[1611]: I0515 10:38:44.654942 1611 state_mem.go:35] "Initializing new in-memory state store" May 15 10:38:44.661564 systemd[1]: Created slice kubepods.slice. May 15 10:38:44.665430 systemd[1]: Created slice kubepods-besteffort.slice. May 15 10:38:44.675826 systemd[1]: Created slice kubepods-burstable.slice. May 15 10:38:44.676836 kubelet[1611]: I0515 10:38:44.676804 1611 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:38:44.675000 audit[1611]: AVC avc: denied { mac_admin } for pid=1611 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:44.675000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:38:44.675000 audit[1611]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b026f0 a1=c000ad5ed8 a2=c000b026c0 a3=25 items=0 ppid=1 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:44.675000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:38:44.677058 kubelet[1611]: I0515 10:38:44.676877 1611 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:38:44.677058 kubelet[1611]: I0515 10:38:44.677020 1611 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 10:38:44.677058 kubelet[1611]: I0515 10:38:44.677033 1611 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:38:44.677319 kubelet[1611]: I0515 10:38:44.677296 1611 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:38:44.678470 kubelet[1611]: E0515 10:38:44.678451 1611 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 15 10:38:44.678519 kubelet[1611]: E0515 10:38:44.678507 1611 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 15 10:38:44.704096 systemd[1]: Created slice kubepods-burstable-pod2980a8ab51edc665be10a02e33130e15.slice. May 15 10:38:44.713025 kubelet[1611]: E0515 10:38:44.712969 1611 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:38:44.714911 systemd[1]: Created slice kubepods-burstable-podb1f95bce406bb258fb32eea0db4d645a.slice. May 15 10:38:44.723364 kubelet[1611]: E0515 10:38:44.723324 1611 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:38:44.725407 systemd[1]: Created slice kubepods-burstable-pod5386fe11ed933ab82453de11903c7f47.slice. May 15 10:38:44.726638 kubelet[1611]: E0515 10:38:44.726610 1611 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:38:44.778937 kubelet[1611]: I0515 10:38:44.778873 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:44.778937 kubelet[1611]: I0515 10:38:44.778927 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 15 10:38:44.779051 kubelet[1611]: I0515 10:38:44.778946 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b1f95bce406bb258fb32eea0db4d645a-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"b1f95bce406bb258fb32eea0db4d645a\") " pod="kube-system/kube-apiserver-localhost" May 15 10:38:44.779051 kubelet[1611]: I0515 10:38:44.778973 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b1f95bce406bb258fb32eea0db4d645a-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"b1f95bce406bb258fb32eea0db4d645a\") " pod="kube-system/kube-apiserver-localhost" May 15 10:38:44.779051 kubelet[1611]: I0515 10:38:44.778988 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:44.779051 kubelet[1611]: I0515 10:38:44.779005 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b1f95bce406bb258fb32eea0db4d645a-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"b1f95bce406bb258fb32eea0db4d645a\") " pod="kube-system/kube-apiserver-localhost" May 15 10:38:44.779140 kubelet[1611]: I0515 10:38:44.779044 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:44.779140 kubelet[1611]: I0515 10:38:44.779095 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:44.779140 kubelet[1611]: I0515 10:38:44.779116 1611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:44.779883 kubelet[1611]: I0515 10:38:44.779865 1611 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 10:38:44.780255 kubelet[1611]: E0515 10:38:44.780211 1611 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.52:6443/api/v1/nodes\": dial tcp 10.0.0.52:6443: connect: connection refused" node="localhost" May 15 10:38:44.981026 kubelet[1611]: E0515 10:38:44.980994 1611 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.52:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.52:6443: connect: connection refused" interval="800ms" May 15 10:38:44.981660 kubelet[1611]: I0515 10:38:44.981631 1611 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 10:38:44.982009 kubelet[1611]: E0515 10:38:44.981975 1611 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.52:6443/api/v1/nodes\": dial tcp 10.0.0.52:6443: connect: connection refused" node="localhost" May 15 10:38:45.014305 kubelet[1611]: E0515 10:38:45.014256 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:45.014997 env[1217]: time="2025-05-15T10:38:45.014923940Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,}" May 15 10:38:45.024105 kubelet[1611]: E0515 10:38:45.024076 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:45.024591 env[1217]: time="2025-05-15T10:38:45.024547220Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:b1f95bce406bb258fb32eea0db4d645a,Namespace:kube-system,Attempt:0,}" May 15 10:38:45.027776 kubelet[1611]: E0515 10:38:45.027726 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:45.028057 env[1217]: time="2025-05-15T10:38:45.028025184Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,}" May 15 10:38:45.226632 kubelet[1611]: W0515 10:38:45.226602 1611 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.52:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.52:6443: connect: connection refused May 15 10:38:45.226738 kubelet[1611]: E0515 10:38:45.226646 1611 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.52:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.52:6443: connect: connection refused" logger="UnhandledError" May 15 10:38:45.383568 kubelet[1611]: I0515 10:38:45.383487 1611 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 10:38:45.383777 kubelet[1611]: E0515 10:38:45.383747 1611 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.52:6443/api/v1/nodes\": dial tcp 10.0.0.52:6443: connect: connection refused" node="localhost" May 15 10:38:45.555770 kubelet[1611]: W0515 10:38:45.555715 1611 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.52:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.52:6443: connect: connection refused May 15 10:38:45.555770 kubelet[1611]: E0515 10:38:45.555769 1611 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.52:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.52:6443: connect: connection refused" logger="UnhandledError" May 15 10:38:45.720185 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4220375789.mount: Deactivated successfully. May 15 10:38:45.726822 env[1217]: time="2025-05-15T10:38:45.726767595Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:45.729413 env[1217]: time="2025-05-15T10:38:45.729362342Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:45.730919 env[1217]: time="2025-05-15T10:38:45.730886230Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:45.731822 env[1217]: time="2025-05-15T10:38:45.731772352Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:45.733515 env[1217]: time="2025-05-15T10:38:45.733481618Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:45.734666 env[1217]: time="2025-05-15T10:38:45.734638138Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:45.735844 env[1217]: time="2025-05-15T10:38:45.735810627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:45.736947 env[1217]: time="2025-05-15T10:38:45.736901273Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:45.738834 env[1217]: time="2025-05-15T10:38:45.738809332Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:45.739980 env[1217]: time="2025-05-15T10:38:45.739948719Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:45.741291 env[1217]: time="2025-05-15T10:38:45.741268284Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:45.741911 env[1217]: time="2025-05-15T10:38:45.741880973Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:45.759232 env[1217]: time="2025-05-15T10:38:45.759161006Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:38:45.759232 env[1217]: time="2025-05-15T10:38:45.759200059Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:38:45.759232 env[1217]: time="2025-05-15T10:38:45.759210188Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:38:45.759402 env[1217]: time="2025-05-15T10:38:45.759345451Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/97729ea55dde144acec1f92719b8bb3ac9fd2099526fd749a3e7a52f1e428f52 pid=1653 runtime=io.containerd.runc.v2 May 15 10:38:45.764732 kubelet[1611]: W0515 10:38:45.764692 1611 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.52:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.52:6443: connect: connection refused May 15 10:38:45.764827 kubelet[1611]: E0515 10:38:45.764749 1611 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.52:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.52:6443: connect: connection refused" logger="UnhandledError" May 15 10:38:45.776653 systemd[1]: Started cri-containerd-97729ea55dde144acec1f92719b8bb3ac9fd2099526fd749a3e7a52f1e428f52.scope. May 15 10:38:45.779409 env[1217]: time="2025-05-15T10:38:45.778174369Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:38:45.779409 env[1217]: time="2025-05-15T10:38:45.778196972Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:38:45.779409 env[1217]: time="2025-05-15T10:38:45.778205488Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:38:45.779409 env[1217]: time="2025-05-15T10:38:45.778326625Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5d4c34a5618f47d660ff657152f9882a280e31547cba46c8283a2a989e03a6cf pid=1682 runtime=io.containerd.runc.v2 May 15 10:38:45.779409 env[1217]: time="2025-05-15T10:38:45.777611764Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:38:45.779409 env[1217]: time="2025-05-15T10:38:45.777641940Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:38:45.779409 env[1217]: time="2025-05-15T10:38:45.777651048Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:38:45.779409 env[1217]: time="2025-05-15T10:38:45.777740004Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ac9795f8f8db0c2680780ff7b6fe619622e19026b5b36765e902d932f9e057c1 pid=1695 runtime=io.containerd.runc.v2 May 15 10:38:45.785773 kubelet[1611]: E0515 10:38:45.785733 1611 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.52:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.52:6443: connect: connection refused" interval="1.6s" May 15 10:38:45.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.785000 audit: BPF prog-id=58 op=LOAD May 15 10:38:45.786000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1653 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937373239656135356464653134346163656331663932373139623862 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1653 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937373239656135356464653134346163656331663932373139623862 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit: BPF prog-id=59 op=LOAD May 15 10:38:45.786000 audit[1665]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030f780 items=0 ppid=1653 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937373239656135356464653134346163656331663932373139623862 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit: BPF prog-id=60 op=LOAD May 15 10:38:45.786000 audit[1665]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030f7c8 items=0 ppid=1653 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937373239656135356464653134346163656331663932373139623862 May 15 10:38:45.786000 audit: BPF prog-id=60 op=UNLOAD May 15 10:38:45.786000 audit: BPF prog-id=59 op=UNLOAD May 15 10:38:45.786000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.786000 audit: BPF prog-id=61 op=LOAD May 15 10:38:45.786000 audit[1665]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00030fbd8 items=0 ppid=1653 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937373239656135356464653134346163656331663932373139623862 May 15 10:38:45.794472 systemd[1]: Started cri-containerd-5d4c34a5618f47d660ff657152f9882a280e31547cba46c8283a2a989e03a6cf.scope. May 15 10:38:45.795297 systemd[1]: Started cri-containerd-ac9795f8f8db0c2680780ff7b6fe619622e19026b5b36765e902d932f9e057c1.scope. May 15 10:38:45.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit: BPF prog-id=62 op=LOAD May 15 10:38:45.805000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1682 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564346333346135363138663437643636306666363537313532663938 May 15 10:38:45.805000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1682 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564346333346135363138663437643636306666363537313532663938 May 15 10:38:45.805000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.805000 audit: BPF prog-id=63 op=LOAD May 15 10:38:45.805000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000398e70 items=0 ppid=1682 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564346333346135363138663437643636306666363537313532663938 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit: BPF prog-id=64 op=LOAD May 15 10:38:45.806000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000398eb8 items=0 ppid=1682 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564346333346135363138663437643636306666363537313532663938 May 15 10:38:45.806000 audit: BPF prog-id=64 op=UNLOAD May 15 10:38:45.806000 audit: BPF prog-id=63 op=UNLOAD May 15 10:38:45.806000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.806000 audit: BPF prog-id=65 op=LOAD May 15 10:38:45.806000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003992c8 items=0 ppid=1682 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564346333346135363138663437643636306666363537313532663938 May 15 10:38:45.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.810000 audit: BPF prog-id=66 op=LOAD May 15 10:38:45.810000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.810000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1695 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163393739356638663864623063323638303738306666376236666536 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1695 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163393739356638663864623063323638303738306666376236666536 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit: BPF prog-id=67 op=LOAD May 15 10:38:45.811000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002e1ce0 items=0 ppid=1695 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163393739356638663864623063323638303738306666376236666536 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit: BPF prog-id=68 op=LOAD May 15 10:38:45.811000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002e1d28 items=0 ppid=1695 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163393739356638663864623063323638303738306666376236666536 May 15 10:38:45.811000 audit: BPF prog-id=68 op=UNLOAD May 15 10:38:45.811000 audit: BPF prog-id=67 op=UNLOAD May 15 10:38:45.811000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.811000 audit: BPF prog-id=69 op=LOAD May 15 10:38:45.811000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003e0138 items=0 ppid=1695 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163393739356638663864623063323638303738306666376236666536 May 15 10:38:45.821902 env[1217]: time="2025-05-15T10:38:45.821733624Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:b1f95bce406bb258fb32eea0db4d645a,Namespace:kube-system,Attempt:0,} returns sandbox id \"97729ea55dde144acec1f92719b8bb3ac9fd2099526fd749a3e7a52f1e428f52\"" May 15 10:38:45.822986 kubelet[1611]: E0515 10:38:45.822958 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:45.825019 env[1217]: time="2025-05-15T10:38:45.824983890Z" level=info msg="CreateContainer within sandbox \"97729ea55dde144acec1f92719b8bb3ac9fd2099526fd749a3e7a52f1e428f52\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 15 10:38:45.837941 env[1217]: time="2025-05-15T10:38:45.837884498Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,} returns sandbox id \"5d4c34a5618f47d660ff657152f9882a280e31547cba46c8283a2a989e03a6cf\"" May 15 10:38:45.838729 kubelet[1611]: E0515 10:38:45.838709 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:45.839543 env[1217]: time="2025-05-15T10:38:45.839503315Z" level=info msg="CreateContainer within sandbox \"97729ea55dde144acec1f92719b8bb3ac9fd2099526fd749a3e7a52f1e428f52\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"100f9fbd4f6039e5280734b4f9f998605609d0bc6f2c33b4d656d10c9b8ab434\"" May 15 10:38:45.840104 env[1217]: time="2025-05-15T10:38:45.840082100Z" level=info msg="StartContainer for \"100f9fbd4f6039e5280734b4f9f998605609d0bc6f2c33b4d656d10c9b8ab434\"" May 15 10:38:45.840331 env[1217]: time="2025-05-15T10:38:45.840301812Z" level=info msg="CreateContainer within sandbox \"5d4c34a5618f47d660ff657152f9882a280e31547cba46c8283a2a989e03a6cf\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 15 10:38:45.845147 env[1217]: time="2025-05-15T10:38:45.845095444Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,} returns sandbox id \"ac9795f8f8db0c2680780ff7b6fe619622e19026b5b36765e902d932f9e057c1\"" May 15 10:38:45.845781 kubelet[1611]: E0515 10:38:45.845761 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:45.848510 env[1217]: time="2025-05-15T10:38:45.848470745Z" level=info msg="CreateContainer within sandbox \"ac9795f8f8db0c2680780ff7b6fe619622e19026b5b36765e902d932f9e057c1\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 15 10:38:45.856165 env[1217]: time="2025-05-15T10:38:45.856115955Z" level=info msg="CreateContainer within sandbox \"5d4c34a5618f47d660ff657152f9882a280e31547cba46c8283a2a989e03a6cf\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"92275cfe16c69b6278fe370d1ea156f651e8395f78ae55502fa7e3d30ef011af\"" May 15 10:38:45.857998 systemd[1]: Started cri-containerd-100f9fbd4f6039e5280734b4f9f998605609d0bc6f2c33b4d656d10c9b8ab434.scope. May 15 10:38:45.859366 env[1217]: time="2025-05-15T10:38:45.859331607Z" level=info msg="StartContainer for \"92275cfe16c69b6278fe370d1ea156f651e8395f78ae55502fa7e3d30ef011af\"" May 15 10:38:45.867645 env[1217]: time="2025-05-15T10:38:45.867601078Z" level=info msg="CreateContainer within sandbox \"ac9795f8f8db0c2680780ff7b6fe619622e19026b5b36765e902d932f9e057c1\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"94e861fbdb75f41711fa01af488c3705795790a8820ec0c4ebcebc285ca3913a\"" May 15 10:38:45.868021 env[1217]: time="2025-05-15T10:38:45.867981852Z" level=info msg="StartContainer for \"94e861fbdb75f41711fa01af488c3705795790a8820ec0c4ebcebc285ca3913a\"" May 15 10:38:45.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.869000 audit: BPF prog-id=70 op=LOAD May 15 10:38:45.870000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1653 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130306639666264346636303339653532383037333462346639663939 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1653 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130306639666264346636303339653532383037333462346639663939 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit: BPF prog-id=71 op=LOAD May 15 10:38:45.870000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000186250 items=0 ppid=1653 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130306639666264346636303339653532383037333462346639663939 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit: BPF prog-id=72 op=LOAD May 15 10:38:45.870000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000186298 items=0 ppid=1653 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130306639666264346636303339653532383037333462346639663939 May 15 10:38:45.870000 audit: BPF prog-id=72 op=UNLOAD May 15 10:38:45.870000 audit: BPF prog-id=71 op=UNLOAD May 15 10:38:45.870000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.870000 audit: BPF prog-id=73 op=LOAD May 15 10:38:45.870000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001866a8 items=0 ppid=1653 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130306639666264346636303339653532383037333462346639663939 May 15 10:38:45.877955 systemd[1]: Started cri-containerd-92275cfe16c69b6278fe370d1ea156f651e8395f78ae55502fa7e3d30ef011af.scope. May 15 10:38:45.883433 systemd[1]: Started cri-containerd-94e861fbdb75f41711fa01af488c3705795790a8820ec0c4ebcebc285ca3913a.scope. May 15 10:38:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.891000 audit: BPF prog-id=74 op=LOAD May 15 10:38:45.892000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1682 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932323735636665313663363962363237386665333730643165613135 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1682 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932323735636665313663363962363237386665333730643165613135 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit: BPF prog-id=75 op=LOAD May 15 10:38:45.892000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003e89b0 items=0 ppid=1682 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932323735636665313663363962363237386665333730643165613135 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit: BPF prog-id=76 op=LOAD May 15 10:38:45.892000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003e89f8 items=0 ppid=1682 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932323735636665313663363962363237386665333730643165613135 May 15 10:38:45.892000 audit: BPF prog-id=76 op=UNLOAD May 15 10:38:45.892000 audit: BPF prog-id=75 op=UNLOAD May 15 10:38:45.892000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.892000 audit: BPF prog-id=77 op=LOAD May 15 10:38:45.892000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003e8e08 items=0 ppid=1682 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932323735636665313663363962363237386665333730643165613135 May 15 10:38:45.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.899000 audit: BPF prog-id=78 op=LOAD May 15 10:38:45.899000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.899000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1695 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934653836316662646237356634313731316661303161663438386333 May 15 10:38:45.899000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.899000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1695 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934653836316662646237356634313731316661303161663438386333 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit: BPF prog-id=79 op=LOAD May 15 10:38:45.900000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003f8d00 items=0 ppid=1695 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934653836316662646237356634313731316661303161663438386333 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit: BPF prog-id=80 op=LOAD May 15 10:38:45.900000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003f8d48 items=0 ppid=1695 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934653836316662646237356634313731316661303161663438386333 May 15 10:38:45.900000 audit: BPF prog-id=80 op=UNLOAD May 15 10:38:45.900000 audit: BPF prog-id=79 op=UNLOAD May 15 10:38:45.900000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:45.900000 audit: BPF prog-id=81 op=LOAD May 15 10:38:45.900000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003f9158 items=0 ppid=1695 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:45.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934653836316662646237356634313731316661303161663438386333 May 15 10:38:45.907688 env[1217]: time="2025-05-15T10:38:45.899953121Z" level=info msg="StartContainer for \"100f9fbd4f6039e5280734b4f9f998605609d0bc6f2c33b4d656d10c9b8ab434\" returns successfully" May 15 10:38:45.921142 env[1217]: time="2025-05-15T10:38:45.921090810Z" level=info msg="StartContainer for \"92275cfe16c69b6278fe370d1ea156f651e8395f78ae55502fa7e3d30ef011af\" returns successfully" May 15 10:38:45.932323 env[1217]: time="2025-05-15T10:38:45.932271171Z" level=info msg="StartContainer for \"94e861fbdb75f41711fa01af488c3705795790a8820ec0c4ebcebc285ca3913a\" returns successfully" May 15 10:38:45.944493 kubelet[1611]: W0515 10:38:45.944419 1611 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.52:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.52:6443: connect: connection refused May 15 10:38:45.944552 kubelet[1611]: E0515 10:38:45.944502 1611 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.52:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.52:6443: connect: connection refused" logger="UnhandledError" May 15 10:38:46.184757 kubelet[1611]: I0515 10:38:46.184717 1611 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 10:38:46.402693 kubelet[1611]: E0515 10:38:46.402656 1611 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:38:46.402788 kubelet[1611]: E0515 10:38:46.402769 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:46.404161 kubelet[1611]: E0515 10:38:46.404137 1611 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:38:46.404238 kubelet[1611]: E0515 10:38:46.404215 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:46.405543 kubelet[1611]: E0515 10:38:46.405522 1611 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:38:46.405631 kubelet[1611]: E0515 10:38:46.405608 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:46.738000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:46.738000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000988000 a2=fc6 a3=0 items=0 ppid=1682 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 key=(null) May 15 10:38:46.738000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:38:46.738000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:46.738000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0000cc0e0 a2=fc6 a3=0 items=0 ppid=1682 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 key=(null) May 15 10:38:46.738000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:38:47.070000 audit[1793]: AVC avc: denied { watch } for pid=1793 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:47.070000 audit[1793]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c004fb6a20 a2=fc6 a3=0 items=0 ppid=1653 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 key=(null) May 15 10:38:47.070000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3532002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:38:47.070000 audit[1793]: AVC avc: denied { watch } for pid=1793 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:47.070000 audit[1793]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c004ed12e0 a2=fc6 a3=0 items=0 ppid=1653 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 key=(null) May 15 10:38:47.070000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3532002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:38:47.070000 audit[1793]: AVC avc: denied { watch } for pid=1793 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:47.070000 audit[1793]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c004bcf590 a2=fc6 a3=0 items=0 ppid=1653 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 key=(null) May 15 10:38:47.070000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3532002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:38:47.077000 audit[1793]: AVC avc: denied { watch } for pid=1793 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:47.077000 audit[1793]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c004bcf7a0 a2=fc6 a3=0 items=0 ppid=1653 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 key=(null) May 15 10:38:47.077000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3532002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:38:47.080000 audit[1793]: AVC avc: denied { watch } for pid=1793 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:47.080000 audit[1793]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00415e8c0 a2=fc6 a3=0 items=0 ppid=1653 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 key=(null) May 15 10:38:47.080000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3532002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:38:47.081000 audit[1793]: AVC avc: denied { watch } for pid=1793 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:47.081000 audit[1793]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00483f740 a2=fc6 a3=0 items=0 ppid=1653 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 key=(null) May 15 10:38:47.081000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3532002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:38:47.218888 kubelet[1611]: I0515 10:38:47.218821 1611 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 15 10:38:47.218888 kubelet[1611]: E0515 10:38:47.218857 1611 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 15 10:38:47.223570 kubelet[1611]: E0515 10:38:47.223536 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:47.324258 kubelet[1611]: E0515 10:38:47.324104 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:47.407475 kubelet[1611]: E0515 10:38:47.407430 1611 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:38:47.407650 kubelet[1611]: E0515 10:38:47.407548 1611 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:38:47.407650 kubelet[1611]: E0515 10:38:47.407559 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:47.407731 kubelet[1611]: E0515 10:38:47.407655 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:47.424726 kubelet[1611]: E0515 10:38:47.424684 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:47.525655 kubelet[1611]: E0515 10:38:47.525611 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:47.626693 kubelet[1611]: E0515 10:38:47.626594 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:47.726740 kubelet[1611]: E0515 10:38:47.726688 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:47.827730 kubelet[1611]: E0515 10:38:47.827683 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:47.927916 kubelet[1611]: E0515 10:38:47.927875 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:48.028507 kubelet[1611]: E0515 10:38:48.028454 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:48.129310 kubelet[1611]: E0515 10:38:48.129267 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:48.229940 kubelet[1611]: E0515 10:38:48.229789 1611 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:48.278344 kubelet[1611]: I0515 10:38:48.278294 1611 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 15 10:38:48.290044 kubelet[1611]: I0515 10:38:48.290007 1611 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 15 10:38:48.293609 kubelet[1611]: I0515 10:38:48.293573 1611 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 15 10:38:48.362856 kubelet[1611]: I0515 10:38:48.362794 1611 apiserver.go:52] "Watching apiserver" May 15 10:38:48.365555 kubelet[1611]: E0515 10:38:48.365531 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:48.377876 kubelet[1611]: I0515 10:38:48.377842 1611 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 10:38:48.407613 kubelet[1611]: I0515 10:38:48.407580 1611 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 15 10:38:48.407779 kubelet[1611]: E0515 10:38:48.407621 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:48.411903 kubelet[1611]: E0515 10:38:48.411860 1611 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 15 10:38:48.412070 kubelet[1611]: E0515 10:38:48.412033 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:49.381910 systemd[1]: Reloading. May 15 10:38:49.409700 kubelet[1611]: E0515 10:38:49.409668 1611 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:49.444300 /usr/lib/systemd/system-generators/torcx-generator[1906]: time="2025-05-15T10:38:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:38:49.444331 /usr/lib/systemd/system-generators/torcx-generator[1906]: time="2025-05-15T10:38:49Z" level=info msg="torcx already run" May 15 10:38:49.517293 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:38:49.517311 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:38:49.534402 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:38:49.612700 kernel: kauditd_printk_skb: 585 callbacks suppressed May 15 10:38:49.612766 kernel: audit: type=1400 audit(1747305529.601:562): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.612800 kernel: audit: type=1400 audit(1747305529.601:563): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.612844 kernel: audit: type=1400 audit(1747305529.601:564): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.616218 kernel: audit: type=1400 audit(1747305529.601:565): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.616306 kernel: audit: type=1400 audit(1747305529.601:566): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.619093 kernel: audit: type=1400 audit(1747305529.601:567): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.621964 kernel: audit: type=1400 audit(1747305529.601:568): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.624814 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 15 10:38:49.624950 kernel: audit: type=1400 audit(1747305529.601:569): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.625725 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 15 10:38:49.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.605000 audit: BPF prog-id=82 op=LOAD May 15 10:38:49.605000 audit: BPF prog-id=74 op=UNLOAD May 15 10:38:49.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit: BPF prog-id=83 op=LOAD May 15 10:38:49.611000 audit: BPF prog-id=43 op=UNLOAD May 15 10:38:49.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit: BPF prog-id=84 op=LOAD May 15 10:38:49.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit: BPF prog-id=85 op=LOAD May 15 10:38:49.611000 audit: BPF prog-id=44 op=UNLOAD May 15 10:38:49.611000 audit: BPF prog-id=45 op=UNLOAD May 15 10:38:49.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.614000 audit: BPF prog-id=86 op=LOAD May 15 10:38:49.614000 audit: BPF prog-id=78 op=UNLOAD May 15 10:38:49.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.620000 audit: BPF prog-id=87 op=LOAD May 15 10:38:49.620000 audit: BPF prog-id=70 op=UNLOAD May 15 10:38:49.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.628000 audit: BPF prog-id=88 op=LOAD May 15 10:38:49.628000 audit: BPF prog-id=46 op=UNLOAD May 15 10:38:49.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.629000 audit: BPF prog-id=89 op=LOAD May 15 10:38:49.629000 audit: BPF prog-id=47 op=UNLOAD May 15 10:38:49.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit: BPF prog-id=90 op=LOAD May 15 10:38:49.632000 audit: BPF prog-id=48 op=UNLOAD May 15 10:38:49.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit: BPF prog-id=91 op=LOAD May 15 10:38:49.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit: BPF prog-id=92 op=LOAD May 15 10:38:49.632000 audit: BPF prog-id=49 op=UNLOAD May 15 10:38:49.632000 audit: BPF prog-id=50 op=UNLOAD May 15 10:38:49.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit: BPF prog-id=93 op=LOAD May 15 10:38:49.633000 audit: BPF prog-id=58 op=UNLOAD May 15 10:38:49.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit: BPF prog-id=94 op=LOAD May 15 10:38:49.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.633000 audit: BPF prog-id=95 op=LOAD May 15 10:38:49.633000 audit: BPF prog-id=51 op=UNLOAD May 15 10:38:49.633000 audit: BPF prog-id=52 op=UNLOAD May 15 10:38:49.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.634000 audit: BPF prog-id=96 op=LOAD May 15 10:38:49.634000 audit: BPF prog-id=66 op=UNLOAD May 15 10:38:49.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit: BPF prog-id=97 op=LOAD May 15 10:38:49.635000 audit: BPF prog-id=53 op=UNLOAD May 15 10:38:49.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.636000 audit: BPF prog-id=98 op=LOAD May 15 10:38:49.636000 audit: BPF prog-id=62 op=UNLOAD May 15 10:38:49.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit: BPF prog-id=99 op=LOAD May 15 10:38:49.637000 audit: BPF prog-id=54 op=UNLOAD May 15 10:38:49.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit: BPF prog-id=100 op=LOAD May 15 10:38:49.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.637000 audit: BPF prog-id=101 op=LOAD May 15 10:38:49.637000 audit: BPF prog-id=55 op=UNLOAD May 15 10:38:49.637000 audit: BPF prog-id=56 op=UNLOAD May 15 10:38:49.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.638000 audit: BPF prog-id=102 op=LOAD May 15 10:38:49.638000 audit: BPF prog-id=57 op=UNLOAD May 15 10:38:49.652168 systemd[1]: Stopping kubelet.service... May 15 10:38:49.677617 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:38:49.677781 systemd[1]: Stopped kubelet.service. May 15 10:38:49.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:49.679328 systemd[1]: Starting kubelet.service... May 15 10:38:49.766123 systemd[1]: Started kubelet.service. May 15 10:38:49.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:49.805997 kubelet[1951]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:38:49.805997 kubelet[1951]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 15 10:38:49.805997 kubelet[1951]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:38:49.806454 kubelet[1951]: I0515 10:38:49.806090 1951 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:38:49.815784 kubelet[1951]: I0515 10:38:49.815742 1951 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 15 10:38:49.815784 kubelet[1951]: I0515 10:38:49.815773 1951 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:38:49.816069 kubelet[1951]: I0515 10:38:49.816051 1951 server.go:954] "Client rotation is on, will bootstrap in background" May 15 10:38:49.817194 kubelet[1951]: I0515 10:38:49.817168 1951 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 15 10:38:49.819302 kubelet[1951]: I0515 10:38:49.819265 1951 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:38:49.822398 kubelet[1951]: E0515 10:38:49.822359 1951 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 10:38:49.822398 kubelet[1951]: I0515 10:38:49.822398 1951 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 10:38:49.826014 kubelet[1951]: I0515 10:38:49.825987 1951 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:38:49.826237 kubelet[1951]: I0515 10:38:49.826183 1951 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:38:49.826565 kubelet[1951]: I0515 10:38:49.826232 1951 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 10:38:49.826565 kubelet[1951]: I0515 10:38:49.826565 1951 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:38:49.826690 kubelet[1951]: I0515 10:38:49.826576 1951 container_manager_linux.go:304] "Creating device plugin manager" May 15 10:38:49.826690 kubelet[1951]: I0515 10:38:49.826612 1951 state_mem.go:36] "Initialized new in-memory state store" May 15 10:38:49.826772 kubelet[1951]: I0515 10:38:49.826750 1951 kubelet.go:446] "Attempting to sync node with API server" May 15 10:38:49.826772 kubelet[1951]: I0515 10:38:49.826769 1951 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:38:49.826841 kubelet[1951]: I0515 10:38:49.826791 1951 kubelet.go:352] "Adding apiserver pod source" May 15 10:38:49.826841 kubelet[1951]: I0515 10:38:49.826801 1951 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:38:49.829218 kubelet[1951]: I0515 10:38:49.829186 1951 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:38:49.830014 kubelet[1951]: I0515 10:38:49.829989 1951 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:38:49.830440 kubelet[1951]: I0515 10:38:49.830416 1951 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 15 10:38:49.830440 kubelet[1951]: I0515 10:38:49.830451 1951 server.go:1287] "Started kubelet" May 15 10:38:49.830756 kubelet[1951]: I0515 10:38:49.830713 1951 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:38:49.832253 kubelet[1951]: I0515 10:38:49.831616 1951 server.go:490] "Adding debug handlers to kubelet server" May 15 10:38:49.831000 audit[1951]: AVC avc: denied { mac_admin } for pid=1951 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.831000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:38:49.831000 audit[1951]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000681530 a1=c0009fa288 a2=c000681500 a3=25 items=0 ppid=1 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:49.831000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:38:49.831000 audit[1951]: AVC avc: denied { mac_admin } for pid=1951 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.831000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:38:49.831000 audit[1951]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000447e80 a1=c0009fa2a0 a2=c0006815c0 a3=25 items=0 ppid=1 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:49.831000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:38:49.833286 kubelet[1951]: I0515 10:38:49.832488 1951 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:38:49.833286 kubelet[1951]: I0515 10:38:49.832625 1951 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:38:49.833286 kubelet[1951]: I0515 10:38:49.832664 1951 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:38:49.833286 kubelet[1951]: I0515 10:38:49.832711 1951 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 15 10:38:49.833286 kubelet[1951]: I0515 10:38:49.832796 1951 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:38:49.836564 kubelet[1951]: I0515 10:38:49.836539 1951 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 10:38:49.837816 kubelet[1951]: I0515 10:38:49.837798 1951 volume_manager.go:297] "Starting Kubelet Volume Manager" May 15 10:38:49.837999 kubelet[1951]: I0515 10:38:49.837976 1951 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 10:38:49.838219 kubelet[1951]: I0515 10:38:49.838206 1951 reconciler.go:26] "Reconciler: start to sync state" May 15 10:38:49.839029 kubelet[1951]: I0515 10:38:49.839008 1951 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:38:49.840404 kubelet[1951]: E0515 10:38:49.840353 1951 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:49.840579 kubelet[1951]: I0515 10:38:49.840565 1951 factory.go:221] Registration of the containerd container factory successfully May 15 10:38:49.840673 kubelet[1951]: I0515 10:38:49.840660 1951 factory.go:221] Registration of the systemd container factory successfully May 15 10:38:49.846446 kubelet[1951]: I0515 10:38:49.846417 1951 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:38:49.847471 kubelet[1951]: I0515 10:38:49.847446 1951 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:38:49.847471 kubelet[1951]: I0515 10:38:49.847470 1951 status_manager.go:227] "Starting to sync pod status with apiserver" May 15 10:38:49.847542 kubelet[1951]: I0515 10:38:49.847488 1951 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 15 10:38:49.847542 kubelet[1951]: I0515 10:38:49.847494 1951 kubelet.go:2388] "Starting kubelet main sync loop" May 15 10:38:49.847542 kubelet[1951]: E0515 10:38:49.847533 1951 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:38:49.847638 kubelet[1951]: E0515 10:38:49.847616 1951 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:38:49.872027 kubelet[1951]: I0515 10:38:49.871987 1951 cpu_manager.go:221] "Starting CPU manager" policy="none" May 15 10:38:49.872027 kubelet[1951]: I0515 10:38:49.872007 1951 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 15 10:38:49.872027 kubelet[1951]: I0515 10:38:49.872025 1951 state_mem.go:36] "Initialized new in-memory state store" May 15 10:38:49.872237 kubelet[1951]: I0515 10:38:49.872137 1951 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 15 10:38:49.872237 kubelet[1951]: I0515 10:38:49.872147 1951 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 15 10:38:49.872237 kubelet[1951]: I0515 10:38:49.872163 1951 policy_none.go:49] "None policy: Start" May 15 10:38:49.872237 kubelet[1951]: I0515 10:38:49.872171 1951 memory_manager.go:186] "Starting memorymanager" policy="None" May 15 10:38:49.872237 kubelet[1951]: I0515 10:38:49.872179 1951 state_mem.go:35] "Initializing new in-memory state store" May 15 10:38:49.872348 kubelet[1951]: I0515 10:38:49.872265 1951 state_mem.go:75] "Updated machine memory state" May 15 10:38:49.875358 kubelet[1951]: I0515 10:38:49.875329 1951 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:38:49.873000 audit[1951]: AVC avc: denied { mac_admin } for pid=1951 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.873000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:38:49.873000 audit[1951]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f4f740 a1=c0009e0378 a2=c000f4f710 a3=25 items=0 ppid=1 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:49.873000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:38:49.875582 kubelet[1951]: I0515 10:38:49.875414 1951 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:38:49.875582 kubelet[1951]: I0515 10:38:49.875536 1951 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 10:38:49.875582 kubelet[1951]: I0515 10:38:49.875552 1951 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:38:49.876001 kubelet[1951]: I0515 10:38:49.875974 1951 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:38:49.876806 kubelet[1951]: E0515 10:38:49.876787 1951 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 15 10:38:49.949058 kubelet[1951]: I0515 10:38:49.949020 1951 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 15 10:38:49.949245 kubelet[1951]: I0515 10:38:49.949020 1951 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 15 10:38:49.949245 kubelet[1951]: I0515 10:38:49.949024 1951 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 15 10:38:49.954536 kubelet[1951]: E0515 10:38:49.954500 1951 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 15 10:38:49.954890 kubelet[1951]: E0515 10:38:49.954873 1951 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 15 10:38:49.955156 kubelet[1951]: E0515 10:38:49.955130 1951 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 15 10:38:49.979824 kubelet[1951]: I0515 10:38:49.979784 1951 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 10:38:49.984341 kubelet[1951]: I0515 10:38:49.984320 1951 kubelet_node_status.go:125] "Node was previously registered" node="localhost" May 15 10:38:49.984419 kubelet[1951]: I0515 10:38:49.984405 1951 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 15 10:38:50.039940 kubelet[1951]: I0515 10:38:50.039879 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:50.039940 kubelet[1951]: I0515 10:38:50.039923 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:50.039940 kubelet[1951]: I0515 10:38:50.039944 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b1f95bce406bb258fb32eea0db4d645a-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"b1f95bce406bb258fb32eea0db4d645a\") " pod="kube-system/kube-apiserver-localhost" May 15 10:38:50.040142 kubelet[1951]: I0515 10:38:50.039960 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b1f95bce406bb258fb32eea0db4d645a-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"b1f95bce406bb258fb32eea0db4d645a\") " pod="kube-system/kube-apiserver-localhost" May 15 10:38:50.040142 kubelet[1951]: I0515 10:38:50.039978 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b1f95bce406bb258fb32eea0db4d645a-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"b1f95bce406bb258fb32eea0db4d645a\") " pod="kube-system/kube-apiserver-localhost" May 15 10:38:50.040142 kubelet[1951]: I0515 10:38:50.039994 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:50.040142 kubelet[1951]: I0515 10:38:50.040017 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:50.040142 kubelet[1951]: I0515 10:38:50.040035 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:50.040278 kubelet[1951]: I0515 10:38:50.040050 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 15 10:38:50.255847 kubelet[1951]: E0515 10:38:50.255704 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:50.255847 kubelet[1951]: E0515 10:38:50.255710 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:50.255847 kubelet[1951]: E0515 10:38:50.255810 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:50.828419 kubelet[1951]: I0515 10:38:50.828353 1951 apiserver.go:52] "Watching apiserver" May 15 10:38:50.838804 kubelet[1951]: I0515 10:38:50.838766 1951 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 10:38:50.862538 kubelet[1951]: I0515 10:38:50.861729 1951 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 15 10:38:50.862538 kubelet[1951]: E0515 10:38:50.861758 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:50.862538 kubelet[1951]: E0515 10:38:50.862257 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:50.867377 kubelet[1951]: E0515 10:38:50.867341 1951 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 15 10:38:50.867953 kubelet[1951]: E0515 10:38:50.867940 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:50.881927 kubelet[1951]: I0515 10:38:50.881858 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.88179366 podStartE2EDuration="2.88179366s" podCreationTimestamp="2025-05-15 10:38:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:38:50.881544252 +0000 UTC m=+1.111022070" watchObservedRunningTime="2025-05-15 10:38:50.88179366 +0000 UTC m=+1.111271478" May 15 10:38:50.890998 kubelet[1951]: I0515 10:38:50.890944 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.890926932 podStartE2EDuration="2.890926932s" podCreationTimestamp="2025-05-15 10:38:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:38:50.89065429 +0000 UTC m=+1.120132108" watchObservedRunningTime="2025-05-15 10:38:50.890926932 +0000 UTC m=+1.120404750" May 15 10:38:50.925254 kubelet[1951]: I0515 10:38:50.925202 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=2.925180842 podStartE2EDuration="2.925180842s" podCreationTimestamp="2025-05-15 10:38:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:38:50.910461914 +0000 UTC m=+1.139939732" watchObservedRunningTime="2025-05-15 10:38:50.925180842 +0000 UTC m=+1.154658660" May 15 10:38:51.784000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:51.784000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014e4fe0 a2=fc6 a3=0 items=0 ppid=1682 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 key=(null) May 15 10:38:51.784000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:38:51.784000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:51.784000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014e51a0 a2=fc6 a3=0 items=0 ppid=1682 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 key=(null) May 15 10:38:51.784000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:38:51.784000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:51.784000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014e5360 a2=fc6 a3=0 items=0 ppid=1682 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 key=(null) May 15 10:38:51.784000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:38:51.785000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:51.785000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00170a360 a2=fc6 a3=0 items=0 ppid=1682 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 key=(null) May 15 10:38:51.785000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:38:51.863417 kubelet[1951]: E0515 10:38:51.863379 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:51.863867 kubelet[1951]: E0515 10:38:51.863847 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:52.932000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 10:38:52.932000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00086d3c0 a2=fc6 a3=0 items=0 ppid=1682 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 key=(null) May 15 10:38:52.932000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:38:53.967953 kubelet[1951]: I0515 10:38:53.967916 1951 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 15 10:38:53.968398 kubelet[1951]: I0515 10:38:53.968381 1951 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 15 10:38:53.968431 env[1217]: time="2025-05-15T10:38:53.968194105Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 10:38:54.530904 sudo[1351]: pam_unix(sudo:session): session closed for user root May 15 10:38:54.529000 audit[1351]: USER_END pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:54.529000 audit[1351]: CRED_DISP pid=1351 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:54.532657 sshd[1348]: pam_unix(sshd:session): session closed for user core May 15 10:38:54.532000 audit[1348]: USER_END pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:54.532000 audit[1348]: CRED_DISP pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:54.535583 systemd[1]: sshd@6-10.0.0.52:22-10.0.0.1:50700.service: Deactivated successfully. May 15 10:38:54.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.52:22-10.0.0.1:50700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:54.536508 systemd[1]: session-7.scope: Deactivated successfully. May 15 10:38:54.536697 systemd[1]: session-7.scope: Consumed 3.871s CPU time. May 15 10:38:54.537192 systemd-logind[1201]: Session 7 logged out. Waiting for processes to exit. May 15 10:38:54.538115 systemd-logind[1201]: Removed session 7. May 15 10:38:54.803318 systemd[1]: Created slice kubepods-besteffort-podd42f0b8e_d122_4169_826e_ecab624b43fa.slice. May 15 10:38:54.874235 kubelet[1951]: I0515 10:38:54.874197 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/d42f0b8e-d122-4169-826e-ecab624b43fa-kube-proxy\") pod \"kube-proxy-kz9q5\" (UID: \"d42f0b8e-d122-4169-826e-ecab624b43fa\") " pod="kube-system/kube-proxy-kz9q5" May 15 10:38:54.874235 kubelet[1951]: I0515 10:38:54.874234 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d42f0b8e-d122-4169-826e-ecab624b43fa-xtables-lock\") pod \"kube-proxy-kz9q5\" (UID: \"d42f0b8e-d122-4169-826e-ecab624b43fa\") " pod="kube-system/kube-proxy-kz9q5" May 15 10:38:54.874457 kubelet[1951]: I0515 10:38:54.874253 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d42f0b8e-d122-4169-826e-ecab624b43fa-lib-modules\") pod \"kube-proxy-kz9q5\" (UID: \"d42f0b8e-d122-4169-826e-ecab624b43fa\") " pod="kube-system/kube-proxy-kz9q5" May 15 10:38:54.874457 kubelet[1951]: I0515 10:38:54.874272 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zmm8v\" (UniqueName: \"kubernetes.io/projected/d42f0b8e-d122-4169-826e-ecab624b43fa-kube-api-access-zmm8v\") pod \"kube-proxy-kz9q5\" (UID: \"d42f0b8e-d122-4169-826e-ecab624b43fa\") " pod="kube-system/kube-proxy-kz9q5" May 15 10:38:54.979686 kubelet[1951]: I0515 10:38:54.979631 1951 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 15 10:38:55.062602 kubelet[1951]: E0515 10:38:55.062473 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:55.069669 systemd[1]: Created slice kubepods-besteffort-pod6e9155d4_86e9_44e0_ac7c_6e8df1023e75.slice. May 15 10:38:55.075902 kubelet[1951]: I0515 10:38:55.075860 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6e9155d4-86e9-44e0-ac7c-6e8df1023e75-var-lib-calico\") pod \"tigera-operator-789496d6f5-7plxf\" (UID: \"6e9155d4-86e9-44e0-ac7c-6e8df1023e75\") " pod="tigera-operator/tigera-operator-789496d6f5-7plxf" May 15 10:38:55.075902 kubelet[1951]: I0515 10:38:55.075901 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n4ldj\" (UniqueName: \"kubernetes.io/projected/6e9155d4-86e9-44e0-ac7c-6e8df1023e75-kube-api-access-n4ldj\") pod \"tigera-operator-789496d6f5-7plxf\" (UID: \"6e9155d4-86e9-44e0-ac7c-6e8df1023e75\") " pod="tigera-operator/tigera-operator-789496d6f5-7plxf" May 15 10:38:55.111640 kubelet[1951]: E0515 10:38:55.111583 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:55.112250 env[1217]: time="2025-05-15T10:38:55.112206020Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kz9q5,Uid:d42f0b8e-d122-4169-826e-ecab624b43fa,Namespace:kube-system,Attempt:0,}" May 15 10:38:55.155117 env[1217]: time="2025-05-15T10:38:55.155027817Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:38:55.155117 env[1217]: time="2025-05-15T10:38:55.155082461Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:38:55.155117 env[1217]: time="2025-05-15T10:38:55.155100365Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:38:55.155326 env[1217]: time="2025-05-15T10:38:55.155240610Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bf2738b5d95bbed5b3aae9f6eb395f3297480489bbe40459839d4f3db0d59ab4 pid=2048 runtime=io.containerd.runc.v2 May 15 10:38:55.167942 systemd[1]: Started cri-containerd-bf2738b5d95bbed5b3aae9f6eb395f3297480489bbe40459839d4f3db0d59ab4.scope. May 15 10:38:55.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.177423 kernel: kauditd_printk_skb: 280 callbacks suppressed May 15 10:38:55.177764 kernel: audit: type=1400 audit(1747305535.175:815): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.183551 kernel: audit: type=1400 audit(1747305535.175:816): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.186650 kernel: audit: type=1400 audit(1747305535.175:817): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.186703 kernel: audit: type=1400 audit(1747305535.175:818): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.192312 kernel: audit: type=1400 audit(1747305535.175:819): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.192391 kernel: audit: type=1400 audit(1747305535.175:820): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.198085 kernel: audit: type=1400 audit(1747305535.175:821): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.201173 kernel: audit: type=1400 audit(1747305535.175:822): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.204080 kernel: audit: type=1400 audit(1747305535.175:823): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.207051 kernel: audit: type=1400 audit(1747305535.179:824): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.179000 audit: BPF prog-id=103 op=LOAD May 15 10:38:55.179000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.179000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2048 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266323733386235643935626265643562336161653966366562333935 May 15 10:38:55.179000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.179000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2048 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266323733386235643935626265643562336161653966366562333935 May 15 10:38:55.179000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.179000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.179000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.179000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.179000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.179000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.179000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.179000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.179000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.179000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.179000 audit: BPF prog-id=104 op=LOAD May 15 10:38:55.179000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002112b0 items=0 ppid=2048 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266323733386235643935626265643562336161653966366562333935 May 15 10:38:55.182000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.182000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.182000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.182000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.182000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.182000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.182000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.182000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.182000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.182000 audit: BPF prog-id=105 op=LOAD May 15 10:38:55.182000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002112f8 items=0 ppid=2048 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266323733386235643935626265643562336161653966366562333935 May 15 10:38:55.188000 audit: BPF prog-id=105 op=UNLOAD May 15 10:38:55.188000 audit: BPF prog-id=104 op=UNLOAD May 15 10:38:55.188000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.188000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.188000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.188000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.188000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.188000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.188000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.188000 audit[2057]: AVC avc: denied { perfmon } for pid=2057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.188000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.188000 audit[2057]: AVC avc: denied { bpf } for pid=2057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.188000 audit: BPF prog-id=106 op=LOAD May 15 10:38:55.188000 audit[2057]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000211708 items=0 ppid=2048 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266323733386235643935626265643562336161653966366562333935 May 15 10:38:55.220316 env[1217]: time="2025-05-15T10:38:55.220250285Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kz9q5,Uid:d42f0b8e-d122-4169-826e-ecab624b43fa,Namespace:kube-system,Attempt:0,} returns sandbox id \"bf2738b5d95bbed5b3aae9f6eb395f3297480489bbe40459839d4f3db0d59ab4\"" May 15 10:38:55.221222 kubelet[1951]: E0515 10:38:55.221197 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:55.223927 env[1217]: time="2025-05-15T10:38:55.223435125Z" level=info msg="CreateContainer within sandbox \"bf2738b5d95bbed5b3aae9f6eb395f3297480489bbe40459839d4f3db0d59ab4\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 10:38:55.270412 env[1217]: time="2025-05-15T10:38:55.270339576Z" level=info msg="CreateContainer within sandbox \"bf2738b5d95bbed5b3aae9f6eb395f3297480489bbe40459839d4f3db0d59ab4\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9fe0e6034e9a4012d3f2fae3ed1a5dbe5c12340a8723b40d96746335a520485a\"" May 15 10:38:55.271124 env[1217]: time="2025-05-15T10:38:55.271069961Z" level=info msg="StartContainer for \"9fe0e6034e9a4012d3f2fae3ed1a5dbe5c12340a8723b40d96746335a520485a\"" May 15 10:38:55.289970 systemd[1]: Started cri-containerd-9fe0e6034e9a4012d3f2fae3ed1a5dbe5c12340a8723b40d96746335a520485a.scope. May 15 10:38:55.305000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.305000 audit[2090]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe82cf6d5f8 items=0 ppid=2048 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966653065363033346539613430313264336632666165336564316135 May 15 10:38:55.306000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.306000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.306000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.306000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.306000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.306000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.306000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.306000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.306000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.306000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.306000 audit: BPF prog-id=107 op=LOAD May 15 10:38:55.306000 audit[2090]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00023bfd8 items=0 ppid=2048 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966653065363033346539613430313264336632666165336564316135 May 15 10:38:55.307000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.307000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.307000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.307000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.307000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.307000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.307000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.307000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.307000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.307000 audit: BPF prog-id=108 op=LOAD May 15 10:38:55.307000 audit[2090]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003aa028 items=0 ppid=2048 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966653065363033346539613430313264336632666165336564316135 May 15 10:38:55.308000 audit: BPF prog-id=108 op=UNLOAD May 15 10:38:55.308000 audit: BPF prog-id=107 op=UNLOAD May 15 10:38:55.308000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.308000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.308000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.308000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.308000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.308000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.308000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.308000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.308000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.308000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.308000 audit: BPF prog-id=109 op=LOAD May 15 10:38:55.308000 audit[2090]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003aa0b8 items=0 ppid=2048 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966653065363033346539613430313264336632666165336564316135 May 15 10:38:55.323250 env[1217]: time="2025-05-15T10:38:55.323024698Z" level=info msg="StartContainer for \"9fe0e6034e9a4012d3f2fae3ed1a5dbe5c12340a8723b40d96746335a520485a\" returns successfully" May 15 10:38:55.372190 env[1217]: time="2025-05-15T10:38:55.372131815Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-7plxf,Uid:6e9155d4-86e9-44e0-ac7c-6e8df1023e75,Namespace:tigera-operator,Attempt:0,}" May 15 10:38:55.389270 env[1217]: time="2025-05-15T10:38:55.389173282Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:38:55.389270 env[1217]: time="2025-05-15T10:38:55.389224419Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:38:55.389270 env[1217]: time="2025-05-15T10:38:55.389235210Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:38:55.389560 env[1217]: time="2025-05-15T10:38:55.389454906Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6d9d54413fadc6602a05bec15267e45cb77eaceafd0a88b89bfbc1cd61bfca5d pid=2132 runtime=io.containerd.runc.v2 May 15 10:38:55.402110 systemd[1]: Started cri-containerd-6d9d54413fadc6602a05bec15267e45cb77eaceafd0a88b89bfbc1cd61bfca5d.scope. May 15 10:38:55.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit: BPF prog-id=110 op=LOAD May 15 10:38:55.411000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2132 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664396435343431336661646336363032613035626563313532363765 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2132 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664396435343431336661646336363032613035626563313532363765 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit: BPF prog-id=111 op=LOAD May 15 10:38:55.411000 audit[2144]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00031faf0 items=0 ppid=2132 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664396435343431336661646336363032613035626563313532363765 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit: BPF prog-id=112 op=LOAD May 15 10:38:55.411000 audit[2144]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00031fb38 items=0 ppid=2132 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664396435343431336661646336363032613035626563313532363765 May 15 10:38:55.411000 audit: BPF prog-id=112 op=UNLOAD May 15 10:38:55.411000 audit: BPF prog-id=111 op=UNLOAD May 15 10:38:55.411000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:55.411000 audit: BPF prog-id=113 op=LOAD May 15 10:38:55.411000 audit[2144]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00031ff48 items=0 ppid=2132 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664396435343431336661646336363032613035626563313532363765 May 15 10:38:55.434000 audit[2188]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.434000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffab158660 a2=0 a3=7fffab15864c items=0 ppid=2102 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:38:55.435000 audit[2189]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.435000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdce9deb10 a2=0 a3=7ffdce9deafc items=0 ppid=2102 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.435000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:38:55.437000 audit[2197]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.437000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdda573ec0 a2=0 a3=7ffdda573eac items=0 ppid=2102 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:38:55.437000 audit[2196]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.437000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe517c5680 a2=0 a3=7ffe517c566c items=0 ppid=2102 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:38:55.438000 audit[2198]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.438000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdda18e2b0 a2=0 a3=7ffdda18e29c items=0 ppid=2102 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.438000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:38:55.440187 env[1217]: time="2025-05-15T10:38:55.439101396Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-7plxf,Uid:6e9155d4-86e9-44e0-ac7c-6e8df1023e75,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"6d9d54413fadc6602a05bec15267e45cb77eaceafd0a88b89bfbc1cd61bfca5d\"" May 15 10:38:55.439000 audit[2199]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.439000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc92fce150 a2=0 a3=7ffc92fce13c items=0 ppid=2102 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:38:55.442332 env[1217]: time="2025-05-15T10:38:55.441415204Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 15 10:38:55.533000 audit[2200]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.533000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffff9b5d000 a2=0 a3=7ffff9b5cfec items=0 ppid=2102 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.533000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:38:55.535000 audit[2202]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.535000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe64475280 a2=0 a3=7ffe6447526c items=0 ppid=2102 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 10:38:55.539000 audit[2205]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.539000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe8f695330 a2=0 a3=7ffe8f69531c items=0 ppid=2102 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.539000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 10:38:55.540000 audit[2206]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.540000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0a384960 a2=0 a3=7ffd0a38494c items=0 ppid=2102 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.540000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:38:55.542000 audit[2208]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.542000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe81643210 a2=0 a3=7ffe816431fc items=0 ppid=2102 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.542000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:38:55.543000 audit[2209]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.543000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee90c0bd0 a2=0 a3=7ffee90c0bbc items=0 ppid=2102 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.543000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:38:55.546000 audit[2211]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.546000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeeaa64a20 a2=0 a3=7ffeeaa64a0c items=0 ppid=2102 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.546000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:38:55.549000 audit[2214]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.549000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff5e3ea1f0 a2=0 a3=7fff5e3ea1dc items=0 ppid=2102 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.549000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 10:38:55.550000 audit[2215]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.550000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb0066080 a2=0 a3=7fffb006606c items=0 ppid=2102 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.550000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:38:55.552000 audit[2217]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.552000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffead94a390 a2=0 a3=7ffead94a37c items=0 ppid=2102 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.552000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:38:55.553000 audit[2218]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.553000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc2724e30 a2=0 a3=7ffdc2724e1c items=0 ppid=2102 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:38:55.556000 audit[2220]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.556000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc960e19c0 a2=0 a3=7ffc960e19ac items=0 ppid=2102 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.556000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:38:55.560000 audit[2223]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.560000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb50ae690 a2=0 a3=7ffcb50ae67c items=0 ppid=2102 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.560000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:38:55.563000 audit[2226]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.563000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd14962020 a2=0 a3=7ffd1496200c items=0 ppid=2102 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.563000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:38:55.564000 audit[2227]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.564000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeec81c1d0 a2=0 a3=7ffeec81c1bc items=0 ppid=2102 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.564000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:38:55.566000 audit[2229]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.566000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff7e2c5890 a2=0 a3=7fff7e2c587c items=0 ppid=2102 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.566000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:38:55.569000 audit[2232]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.569000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc459e4450 a2=0 a3=7ffc459e443c items=0 ppid=2102 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:38:55.570000 audit[2233]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.570000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3c3f1f00 a2=0 a3=7ffe3c3f1eec items=0 ppid=2102 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.570000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:38:55.572000 audit[2235]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:55.572000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffeb0b16dd0 a2=0 a3=7ffeb0b16dbc items=0 ppid=2102 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:38:55.593000 audit[2241]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:38:55.593000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc86228470 a2=0 a3=7ffc8622845c items=0 ppid=2102 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.593000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:38:55.608000 audit[2241]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:38:55.608000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc86228470 a2=0 a3=7ffc8622845c items=0 ppid=2102 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.608000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:38:55.609000 audit[2246]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.609000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc994eb6b0 a2=0 a3=7ffc994eb69c items=0 ppid=2102 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.609000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:38:55.611000 audit[2248]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.611000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd795ece10 a2=0 a3=7ffd795ecdfc items=0 ppid=2102 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.611000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 10:38:55.614000 audit[2251]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.614000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff225d4a00 a2=0 a3=7fff225d49ec items=0 ppid=2102 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.614000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 10:38:55.615000 audit[2252]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.615000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb4f17920 a2=0 a3=7ffdb4f1790c items=0 ppid=2102 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.615000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:38:55.617000 audit[2254]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.617000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe0a511600 a2=0 a3=7ffe0a5115ec items=0 ppid=2102 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.617000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:38:55.618000 audit[2255]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.618000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff21da3bc0 a2=0 a3=7fff21da3bac items=0 ppid=2102 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.618000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:38:55.620000 audit[2257]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.620000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdf46c24b0 a2=0 a3=7ffdf46c249c items=0 ppid=2102 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.620000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 10:38:55.623000 audit[2260]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.623000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc93e80f40 a2=0 a3=7ffc93e80f2c items=0 ppid=2102 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.623000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:38:55.624000 audit[2261]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.624000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff18247f80 a2=0 a3=7fff18247f6c items=0 ppid=2102 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.624000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:38:55.626000 audit[2263]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.626000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd40e3aa00 a2=0 a3=7ffd40e3a9ec items=0 ppid=2102 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.626000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:38:55.627000 audit[2264]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.627000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd84aa9ff0 a2=0 a3=7ffd84aa9fdc items=0 ppid=2102 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.627000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:38:55.629000 audit[2266]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.629000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe34f07b60 a2=0 a3=7ffe34f07b4c items=0 ppid=2102 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.629000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:38:55.632000 audit[2269]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.632000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb956aab0 a2=0 a3=7ffcb956aa9c items=0 ppid=2102 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.632000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:38:55.635000 audit[2272]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.635000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd5e76d520 a2=0 a3=7ffd5e76d50c items=0 ppid=2102 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.635000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 10:38:55.636000 audit[2273]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.636000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc6d3fa3d0 a2=0 a3=7ffc6d3fa3bc items=0 ppid=2102 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.636000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:38:55.637000 audit[2275]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.637000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd526a3a10 a2=0 a3=7ffd526a39fc items=0 ppid=2102 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.637000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:38:55.640000 audit[2278]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.640000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffecb612000 a2=0 a3=7ffecb611fec items=0 ppid=2102 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.640000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:38:55.641000 audit[2279]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.641000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe84524730 a2=0 a3=7ffe8452471c items=0 ppid=2102 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.641000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:38:55.643000 audit[2281]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.643000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe1efb0950 a2=0 a3=7ffe1efb093c items=0 ppid=2102 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.643000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:38:55.644000 audit[2282]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.644000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc87c39940 a2=0 a3=7ffc87c3992c items=0 ppid=2102 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.644000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:38:55.646000 audit[2284]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.646000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe31890850 a2=0 a3=7ffe3189083c items=0 ppid=2102 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.646000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:38:55.648000 audit[2287]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:55.648000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffede203810 a2=0 a3=7ffede2037fc items=0 ppid=2102 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:38:55.651000 audit[2289]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:38:55.651000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffdede47970 a2=0 a3=7ffdede4795c items=0 ppid=2102 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.651000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:38:55.651000 audit[2289]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:38:55.651000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdede47970 a2=0 a3=7ffdede4795c items=0 ppid=2102 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:55.651000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:38:55.872360 kubelet[1951]: E0515 10:38:55.872247 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:55.872598 kubelet[1951]: E0515 10:38:55.872363 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:55.953726 kubelet[1951]: I0515 10:38:55.953658 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-kz9q5" podStartSLOduration=1.953638448 podStartE2EDuration="1.953638448s" podCreationTimestamp="2025-05-15 10:38:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:38:55.953246033 +0000 UTC m=+6.182723842" watchObservedRunningTime="2025-05-15 10:38:55.953638448 +0000 UTC m=+6.183116266" May 15 10:38:56.428221 kubelet[1951]: E0515 10:38:56.428177 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:56.873669 kubelet[1951]: E0515 10:38:56.873544 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:57.477009 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2190649954.mount: Deactivated successfully. May 15 10:38:57.874590 kubelet[1951]: E0515 10:38:57.874464 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:58.602358 kubelet[1951]: E0515 10:38:58.602188 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:58.875445 kubelet[1951]: E0515 10:38:58.875297 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:59.458737 env[1217]: time="2025-05-15T10:38:59.458674726Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:59.524489 env[1217]: time="2025-05-15T10:38:59.524412603Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:59.612181 env[1217]: time="2025-05-15T10:38:59.612114188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:59.643645 env[1217]: time="2025-05-15T10:38:59.643566817Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:59.644156 env[1217]: time="2025-05-15T10:38:59.644104234Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 15 10:38:59.646559 env[1217]: time="2025-05-15T10:38:59.646515375Z" level=info msg="CreateContainer within sandbox \"6d9d54413fadc6602a05bec15267e45cb77eaceafd0a88b89bfbc1cd61bfca5d\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 15 10:38:59.792787 env[1217]: time="2025-05-15T10:38:59.792663252Z" level=info msg="CreateContainer within sandbox \"6d9d54413fadc6602a05bec15267e45cb77eaceafd0a88b89bfbc1cd61bfca5d\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"138fb88a56438cf8baf2bb5b2b9f670c1ce64bda9d08bf81f7e5de98567454fe\"" May 15 10:38:59.793343 env[1217]: time="2025-05-15T10:38:59.793298213Z" level=info msg="StartContainer for \"138fb88a56438cf8baf2bb5b2b9f670c1ce64bda9d08bf81f7e5de98567454fe\"" May 15 10:38:59.810637 systemd[1]: Started cri-containerd-138fb88a56438cf8baf2bb5b2b9f670c1ce64bda9d08bf81f7e5de98567454fe.scope. May 15 10:38:59.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit: BPF prog-id=114 op=LOAD May 15 10:38:59.825000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2132 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133386662383861353634333863663862616632626235623262396636 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=2132 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133386662383861353634333863663862616632626235623262396636 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit: BPF prog-id=115 op=LOAD May 15 10:38:59.825000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c00032fd40 items=0 ppid=2132 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133386662383861353634333863663862616632626235623262396636 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit: BPF prog-id=116 op=LOAD May 15 10:38:59.825000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c00032fd88 items=0 ppid=2132 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133386662383861353634333863663862616632626235623262396636 May 15 10:38:59.825000 audit: BPF prog-id=116 op=UNLOAD May 15 10:38:59.825000 audit: BPF prog-id=115 op=UNLOAD May 15 10:38:59.825000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.825000 audit: BPF prog-id=117 op=LOAD May 15 10:38:59.825000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c00039a198 items=0 ppid=2132 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133386662383861353634333863663862616632626235623262396636 May 15 10:38:59.840900 env[1217]: time="2025-05-15T10:38:59.840836652Z" level=info msg="StartContainer for \"138fb88a56438cf8baf2bb5b2b9f670c1ce64bda9d08bf81f7e5de98567454fe\" returns successfully" May 15 10:38:59.879117 kubelet[1951]: E0515 10:38:59.879075 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:02.595408 kernel: kauditd_printk_skb: 357 callbacks suppressed May 15 10:39:02.595564 kernel: audit: type=1325 audit(1747305542.586:926): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:02.595588 kernel: audit: type=1300 audit(1747305542.586:926): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc497ec200 a2=0 a3=7ffc497ec1ec items=0 ppid=2102 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.586000 audit[2333]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:02.586000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc497ec200 a2=0 a3=7ffc497ec1ec items=0 ppid=2102 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.586000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:02.599044 kernel: audit: type=1327 audit(1747305542.586:926): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:02.599000 audit[2333]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:02.599000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc497ec200 a2=0 a3=0 items=0 ppid=2102 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.608538 kernel: audit: type=1325 audit(1747305542.599:927): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:02.608585 kernel: audit: type=1300 audit(1747305542.599:927): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc497ec200 a2=0 a3=0 items=0 ppid=2102 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.608608 kernel: audit: type=1327 audit(1747305542.599:927): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:02.599000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:02.615000 audit[2335]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:02.615000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffec3ea2470 a2=0 a3=7ffec3ea245c items=0 ppid=2102 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.624615 kernel: audit: type=1325 audit(1747305542.615:928): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:02.624674 kernel: audit: type=1300 audit(1747305542.615:928): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffec3ea2470 a2=0 a3=7ffec3ea245c items=0 ppid=2102 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.624696 kernel: audit: type=1327 audit(1747305542.615:928): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:02.615000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:02.627000 audit[2335]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:02.627000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffec3ea2470 a2=0 a3=0 items=0 ppid=2102 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.627000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:02.632396 kernel: audit: type=1325 audit(1747305542.627:929): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:03.210542 kubelet[1951]: I0515 10:39:03.210467 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-789496d6f5-7plxf" podStartSLOduration=4.005887307 podStartE2EDuration="8.210445587s" podCreationTimestamp="2025-05-15 10:38:55 +0000 UTC" firstStartedPulling="2025-05-15 10:38:55.440497834 +0000 UTC m=+5.669975652" lastFinishedPulling="2025-05-15 10:38:59.645056114 +0000 UTC m=+9.874533932" observedRunningTime="2025-05-15 10:38:59.888287335 +0000 UTC m=+10.117765153" watchObservedRunningTime="2025-05-15 10:39:03.210445587 +0000 UTC m=+13.439923405" May 15 10:39:03.218409 systemd[1]: Created slice kubepods-besteffort-poda65fcea1_f42a_4423_92e5_7181cab032f7.slice. May 15 10:39:03.234115 kubelet[1951]: I0515 10:39:03.234071 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/a65fcea1-f42a-4423-92e5-7181cab032f7-typha-certs\") pod \"calico-typha-7f9d5586-zs9h4\" (UID: \"a65fcea1-f42a-4423-92e5-7181cab032f7\") " pod="calico-system/calico-typha-7f9d5586-zs9h4" May 15 10:39:03.234115 kubelet[1951]: I0515 10:39:03.234110 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a65fcea1-f42a-4423-92e5-7181cab032f7-tigera-ca-bundle\") pod \"calico-typha-7f9d5586-zs9h4\" (UID: \"a65fcea1-f42a-4423-92e5-7181cab032f7\") " pod="calico-system/calico-typha-7f9d5586-zs9h4" May 15 10:39:03.234115 kubelet[1951]: I0515 10:39:03.234131 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mb5x7\" (UniqueName: \"kubernetes.io/projected/a65fcea1-f42a-4423-92e5-7181cab032f7-kube-api-access-mb5x7\") pod \"calico-typha-7f9d5586-zs9h4\" (UID: \"a65fcea1-f42a-4423-92e5-7181cab032f7\") " pod="calico-system/calico-typha-7f9d5586-zs9h4" May 15 10:39:03.298670 systemd[1]: Created slice kubepods-besteffort-pod0d4523d4_f92b_4c2a_9495_ec79a03e5e5a.slice. May 15 10:39:03.334516 kubelet[1951]: I0515 10:39:03.334453 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/0d4523d4-f92b-4c2a-9495-ec79a03e5e5a-flexvol-driver-host\") pod \"calico-node-fcvxt\" (UID: \"0d4523d4-f92b-4c2a-9495-ec79a03e5e5a\") " pod="calico-system/calico-node-fcvxt" May 15 10:39:03.334516 kubelet[1951]: I0515 10:39:03.334504 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/0d4523d4-f92b-4c2a-9495-ec79a03e5e5a-var-run-calico\") pod \"calico-node-fcvxt\" (UID: \"0d4523d4-f92b-4c2a-9495-ec79a03e5e5a\") " pod="calico-system/calico-node-fcvxt" May 15 10:39:03.334516 kubelet[1951]: I0515 10:39:03.334522 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7r8j2\" (UniqueName: \"kubernetes.io/projected/0d4523d4-f92b-4c2a-9495-ec79a03e5e5a-kube-api-access-7r8j2\") pod \"calico-node-fcvxt\" (UID: \"0d4523d4-f92b-4c2a-9495-ec79a03e5e5a\") " pod="calico-system/calico-node-fcvxt" May 15 10:39:03.334909 kubelet[1951]: I0515 10:39:03.334540 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/0d4523d4-f92b-4c2a-9495-ec79a03e5e5a-policysync\") pod \"calico-node-fcvxt\" (UID: \"0d4523d4-f92b-4c2a-9495-ec79a03e5e5a\") " pod="calico-system/calico-node-fcvxt" May 15 10:39:03.334909 kubelet[1951]: I0515 10:39:03.334553 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/0d4523d4-f92b-4c2a-9495-ec79a03e5e5a-node-certs\") pod \"calico-node-fcvxt\" (UID: \"0d4523d4-f92b-4c2a-9495-ec79a03e5e5a\") " pod="calico-system/calico-node-fcvxt" May 15 10:39:03.334909 kubelet[1951]: I0515 10:39:03.334567 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/0d4523d4-f92b-4c2a-9495-ec79a03e5e5a-cni-net-dir\") pod \"calico-node-fcvxt\" (UID: \"0d4523d4-f92b-4c2a-9495-ec79a03e5e5a\") " pod="calico-system/calico-node-fcvxt" May 15 10:39:03.334909 kubelet[1951]: I0515 10:39:03.334582 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/0d4523d4-f92b-4c2a-9495-ec79a03e5e5a-cni-log-dir\") pod \"calico-node-fcvxt\" (UID: \"0d4523d4-f92b-4c2a-9495-ec79a03e5e5a\") " pod="calico-system/calico-node-fcvxt" May 15 10:39:03.334909 kubelet[1951]: I0515 10:39:03.334595 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0d4523d4-f92b-4c2a-9495-ec79a03e5e5a-xtables-lock\") pod \"calico-node-fcvxt\" (UID: \"0d4523d4-f92b-4c2a-9495-ec79a03e5e5a\") " pod="calico-system/calico-node-fcvxt" May 15 10:39:03.335096 kubelet[1951]: I0515 10:39:03.334608 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0d4523d4-f92b-4c2a-9495-ec79a03e5e5a-var-lib-calico\") pod \"calico-node-fcvxt\" (UID: \"0d4523d4-f92b-4c2a-9495-ec79a03e5e5a\") " pod="calico-system/calico-node-fcvxt" May 15 10:39:03.335096 kubelet[1951]: I0515 10:39:03.334621 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0d4523d4-f92b-4c2a-9495-ec79a03e5e5a-tigera-ca-bundle\") pod \"calico-node-fcvxt\" (UID: \"0d4523d4-f92b-4c2a-9495-ec79a03e5e5a\") " pod="calico-system/calico-node-fcvxt" May 15 10:39:03.335096 kubelet[1951]: I0515 10:39:03.334633 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/0d4523d4-f92b-4c2a-9495-ec79a03e5e5a-cni-bin-dir\") pod \"calico-node-fcvxt\" (UID: \"0d4523d4-f92b-4c2a-9495-ec79a03e5e5a\") " pod="calico-system/calico-node-fcvxt" May 15 10:39:03.335096 kubelet[1951]: I0515 10:39:03.334658 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0d4523d4-f92b-4c2a-9495-ec79a03e5e5a-lib-modules\") pod \"calico-node-fcvxt\" (UID: \"0d4523d4-f92b-4c2a-9495-ec79a03e5e5a\") " pod="calico-system/calico-node-fcvxt" May 15 10:39:03.413974 kubelet[1951]: E0515 10:39:03.413901 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b7nq8" podUID="5de422bf-365e-4b7f-b2a7-451d003a44f6" May 15 10:39:03.435714 kubelet[1951]: I0515 10:39:03.435658 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/5de422bf-365e-4b7f-b2a7-451d003a44f6-registration-dir\") pod \"csi-node-driver-b7nq8\" (UID: \"5de422bf-365e-4b7f-b2a7-451d003a44f6\") " pod="calico-system/csi-node-driver-b7nq8" May 15 10:39:03.436000 kubelet[1951]: I0515 10:39:03.435963 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/5de422bf-365e-4b7f-b2a7-451d003a44f6-kubelet-dir\") pod \"csi-node-driver-b7nq8\" (UID: \"5de422bf-365e-4b7f-b2a7-451d003a44f6\") " pod="calico-system/csi-node-driver-b7nq8" May 15 10:39:03.436098 kubelet[1951]: I0515 10:39:03.436080 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fxwwz\" (UniqueName: \"kubernetes.io/projected/5de422bf-365e-4b7f-b2a7-451d003a44f6-kube-api-access-fxwwz\") pod \"csi-node-driver-b7nq8\" (UID: \"5de422bf-365e-4b7f-b2a7-451d003a44f6\") " pod="calico-system/csi-node-driver-b7nq8" May 15 10:39:03.436397 kubelet[1951]: E0515 10:39:03.436378 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.436397 kubelet[1951]: W0515 10:39:03.436396 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.436479 kubelet[1951]: E0515 10:39:03.436422 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.437216 kubelet[1951]: E0515 10:39:03.437199 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.437216 kubelet[1951]: W0515 10:39:03.437212 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.437304 kubelet[1951]: E0515 10:39:03.437226 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.437499 kubelet[1951]: E0515 10:39:03.437475 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.437499 kubelet[1951]: W0515 10:39:03.437490 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.437499 kubelet[1951]: E0515 10:39:03.437500 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.437715 kubelet[1951]: E0515 10:39:03.437694 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.437715 kubelet[1951]: W0515 10:39:03.437708 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.437807 kubelet[1951]: E0515 10:39:03.437720 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.437807 kubelet[1951]: I0515 10:39:03.437734 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/5de422bf-365e-4b7f-b2a7-451d003a44f6-socket-dir\") pod \"csi-node-driver-b7nq8\" (UID: \"5de422bf-365e-4b7f-b2a7-451d003a44f6\") " pod="calico-system/csi-node-driver-b7nq8" May 15 10:39:03.438068 kubelet[1951]: E0515 10:39:03.438047 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.438068 kubelet[1951]: W0515 10:39:03.438063 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.438141 kubelet[1951]: E0515 10:39:03.438076 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.438697 kubelet[1951]: E0515 10:39:03.438671 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.438767 kubelet[1951]: W0515 10:39:03.438686 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.438767 kubelet[1951]: E0515 10:39:03.438727 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.439013 kubelet[1951]: E0515 10:39:03.438991 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.439013 kubelet[1951]: W0515 10:39:03.439006 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.439100 kubelet[1951]: E0515 10:39:03.439072 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.439410 kubelet[1951]: E0515 10:39:03.439363 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.439410 kubelet[1951]: W0515 10:39:03.439404 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.439500 kubelet[1951]: E0515 10:39:03.439437 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.439638 kubelet[1951]: E0515 10:39:03.439618 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.439638 kubelet[1951]: W0515 10:39:03.439632 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.439712 kubelet[1951]: E0515 10:39:03.439675 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.439919 kubelet[1951]: E0515 10:39:03.439897 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.439919 kubelet[1951]: W0515 10:39:03.439913 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.440023 kubelet[1951]: E0515 10:39:03.439940 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.440197 kubelet[1951]: E0515 10:39:03.440180 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.440197 kubelet[1951]: W0515 10:39:03.440198 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.440284 kubelet[1951]: E0515 10:39:03.440233 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.440415 kubelet[1951]: E0515 10:39:03.440397 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.440415 kubelet[1951]: W0515 10:39:03.440409 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.440488 kubelet[1951]: E0515 10:39:03.440455 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.443013 kubelet[1951]: E0515 10:39:03.442983 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.443013 kubelet[1951]: W0515 10:39:03.443005 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.443122 kubelet[1951]: E0515 10:39:03.443090 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.444047 kubelet[1951]: E0515 10:39:03.444022 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.444047 kubelet[1951]: W0515 10:39:03.444038 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.444138 kubelet[1951]: E0515 10:39:03.444070 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.444331 kubelet[1951]: E0515 10:39:03.444316 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.444331 kubelet[1951]: W0515 10:39:03.444327 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.444421 kubelet[1951]: E0515 10:39:03.444382 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.444564 kubelet[1951]: E0515 10:39:03.444547 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.444564 kubelet[1951]: W0515 10:39:03.444559 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.444632 kubelet[1951]: E0515 10:39:03.444591 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.444841 kubelet[1951]: E0515 10:39:03.444818 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.444841 kubelet[1951]: W0515 10:39:03.444834 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.444914 kubelet[1951]: E0515 10:39:03.444850 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.450139 kubelet[1951]: E0515 10:39:03.450095 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.450139 kubelet[1951]: W0515 10:39:03.450125 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.450296 kubelet[1951]: E0515 10:39:03.450159 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.450408 kubelet[1951]: E0515 10:39:03.450389 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.450408 kubelet[1951]: W0515 10:39:03.450404 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.450495 kubelet[1951]: E0515 10:39:03.450474 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.450999 kubelet[1951]: E0515 10:39:03.450981 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.450999 kubelet[1951]: W0515 10:39:03.450992 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.451086 kubelet[1951]: E0515 10:39:03.451011 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.451173 kubelet[1951]: E0515 10:39:03.451151 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.451173 kubelet[1951]: W0515 10:39:03.451165 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.451254 kubelet[1951]: E0515 10:39:03.451202 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.451356 kubelet[1951]: E0515 10:39:03.451323 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.451356 kubelet[1951]: W0515 10:39:03.451348 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.451469 kubelet[1951]: E0515 10:39:03.451416 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.451570 kubelet[1951]: E0515 10:39:03.451551 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.451570 kubelet[1951]: W0515 10:39:03.451562 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.451665 kubelet[1951]: E0515 10:39:03.451585 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.451742 kubelet[1951]: E0515 10:39:03.451723 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.451742 kubelet[1951]: W0515 10:39:03.451733 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.451833 kubelet[1951]: E0515 10:39:03.451754 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.452168 kubelet[1951]: E0515 10:39:03.452145 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.452168 kubelet[1951]: W0515 10:39:03.452158 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.452246 kubelet[1951]: E0515 10:39:03.452183 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.452415 kubelet[1951]: E0515 10:39:03.452363 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.452415 kubelet[1951]: W0515 10:39:03.452414 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.452511 kubelet[1951]: E0515 10:39:03.452503 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.452647 kubelet[1951]: E0515 10:39:03.452621 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.452647 kubelet[1951]: W0515 10:39:03.452639 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.452761 kubelet[1951]: E0515 10:39:03.452739 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.453041 kubelet[1951]: E0515 10:39:03.452996 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.453041 kubelet[1951]: W0515 10:39:03.453016 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.453257 kubelet[1951]: E0515 10:39:03.453100 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.453544 kubelet[1951]: E0515 10:39:03.453520 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.453544 kubelet[1951]: W0515 10:39:03.453539 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.453658 kubelet[1951]: E0515 10:39:03.453638 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.458597 kubelet[1951]: E0515 10:39:03.457454 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.458597 kubelet[1951]: W0515 10:39:03.457476 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.458597 kubelet[1951]: E0515 10:39:03.457579 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.458597 kubelet[1951]: E0515 10:39:03.458343 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.458597 kubelet[1951]: W0515 10:39:03.458354 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.458597 kubelet[1951]: E0515 10:39:03.458539 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.458800 kubelet[1951]: E0515 10:39:03.458651 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.458800 kubelet[1951]: W0515 10:39:03.458659 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.458800 kubelet[1951]: E0515 10:39:03.458739 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.458873 kubelet[1951]: E0515 10:39:03.458866 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.458899 kubelet[1951]: W0515 10:39:03.458876 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.458971 kubelet[1951]: E0515 10:39:03.458942 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.459087 kubelet[1951]: E0515 10:39:03.459059 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.459087 kubelet[1951]: W0515 10:39:03.459077 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.459162 kubelet[1951]: E0515 10:39:03.459143 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.459271 kubelet[1951]: E0515 10:39:03.459245 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.459318 kubelet[1951]: W0515 10:39:03.459275 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.459411 kubelet[1951]: E0515 10:39:03.459385 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.459460 kubelet[1951]: E0515 10:39:03.459453 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.459496 kubelet[1951]: W0515 10:39:03.459462 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.459628 kubelet[1951]: E0515 10:39:03.459534 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.459682 kubelet[1951]: E0515 10:39:03.459630 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.459682 kubelet[1951]: W0515 10:39:03.459669 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.459812 kubelet[1951]: E0515 10:39:03.459778 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.459912 kubelet[1951]: E0515 10:39:03.459887 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.459912 kubelet[1951]: W0515 10:39:03.459906 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.459994 kubelet[1951]: E0515 10:39:03.459979 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.460079 kubelet[1951]: E0515 10:39:03.460055 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.460079 kubelet[1951]: W0515 10:39:03.460071 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.460146 kubelet[1951]: E0515 10:39:03.460083 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.460146 kubelet[1951]: I0515 10:39:03.460105 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/5de422bf-365e-4b7f-b2a7-451d003a44f6-varrun\") pod \"csi-node-driver-b7nq8\" (UID: \"5de422bf-365e-4b7f-b2a7-451d003a44f6\") " pod="calico-system/csi-node-driver-b7nq8" May 15 10:39:03.460333 kubelet[1951]: E0515 10:39:03.460306 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.460333 kubelet[1951]: W0515 10:39:03.460325 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.460451 kubelet[1951]: E0515 10:39:03.460433 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.460532 kubelet[1951]: E0515 10:39:03.460508 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.460532 kubelet[1951]: W0515 10:39:03.460527 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.460672 kubelet[1951]: E0515 10:39:03.460595 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.460672 kubelet[1951]: E0515 10:39:03.460659 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.460672 kubelet[1951]: W0515 10:39:03.460667 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.460822 kubelet[1951]: E0515 10:39:03.460740 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.460874 kubelet[1951]: E0515 10:39:03.460848 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.460874 kubelet[1951]: W0515 10:39:03.460866 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.460978 kubelet[1951]: E0515 10:39:03.460950 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.461396 kubelet[1951]: E0515 10:39:03.461039 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.461396 kubelet[1951]: W0515 10:39:03.461052 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.461396 kubelet[1951]: E0515 10:39:03.461063 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.461396 kubelet[1951]: E0515 10:39:03.461247 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.461396 kubelet[1951]: W0515 10:39:03.461255 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.461396 kubelet[1951]: E0515 10:39:03.461266 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.461581 kubelet[1951]: E0515 10:39:03.461429 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.461581 kubelet[1951]: W0515 10:39:03.461439 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.461581 kubelet[1951]: E0515 10:39:03.461450 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.463282 kubelet[1951]: E0515 10:39:03.461656 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.463282 kubelet[1951]: W0515 10:39:03.461672 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.463282 kubelet[1951]: E0515 10:39:03.461684 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.463282 kubelet[1951]: E0515 10:39:03.461884 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.463282 kubelet[1951]: W0515 10:39:03.461893 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.463282 kubelet[1951]: E0515 10:39:03.461921 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.463282 kubelet[1951]: E0515 10:39:03.462173 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.463282 kubelet[1951]: W0515 10:39:03.462182 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.463282 kubelet[1951]: E0515 10:39:03.462283 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.464702 kubelet[1951]: E0515 10:39:03.464602 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.464702 kubelet[1951]: W0515 10:39:03.464622 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.464702 kubelet[1951]: E0515 10:39:03.464642 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.464949 kubelet[1951]: E0515 10:39:03.464922 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.464949 kubelet[1951]: W0515 10:39:03.464949 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.465026 kubelet[1951]: E0515 10:39:03.464960 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.522507 kubelet[1951]: E0515 10:39:03.522462 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:03.523103 env[1217]: time="2025-05-15T10:39:03.523047659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7f9d5586-zs9h4,Uid:a65fcea1-f42a-4423-92e5-7181cab032f7,Namespace:calico-system,Attempt:0,}" May 15 10:39:03.560957 kubelet[1951]: E0515 10:39:03.560906 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.560957 kubelet[1951]: W0515 10:39:03.560944 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.560957 kubelet[1951]: E0515 10:39:03.560973 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.561208 kubelet[1951]: E0515 10:39:03.561183 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.561208 kubelet[1951]: W0515 10:39:03.561195 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.561208 kubelet[1951]: E0515 10:39:03.561210 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.561459 kubelet[1951]: E0515 10:39:03.561439 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.561459 kubelet[1951]: W0515 10:39:03.561454 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.561552 kubelet[1951]: E0515 10:39:03.561471 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.561831 kubelet[1951]: E0515 10:39:03.561769 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.561831 kubelet[1951]: W0515 10:39:03.561816 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.562074 kubelet[1951]: E0515 10:39:03.561852 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.562168 kubelet[1951]: E0515 10:39:03.562135 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.562168 kubelet[1951]: W0515 10:39:03.562149 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.562457 kubelet[1951]: E0515 10:39:03.562193 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.562661 kubelet[1951]: E0515 10:39:03.562639 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.562661 kubelet[1951]: W0515 10:39:03.562653 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.562799 kubelet[1951]: E0515 10:39:03.562684 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.562985 kubelet[1951]: E0515 10:39:03.562960 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.562985 kubelet[1951]: W0515 10:39:03.562982 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.563153 kubelet[1951]: E0515 10:39:03.563130 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.563239 kubelet[1951]: E0515 10:39:03.563228 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.563239 kubelet[1951]: W0515 10:39:03.563238 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.563357 kubelet[1951]: E0515 10:39:03.563333 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.563473 kubelet[1951]: E0515 10:39:03.563452 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.563540 kubelet[1951]: W0515 10:39:03.563467 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.563610 kubelet[1951]: E0515 10:39:03.563585 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.563744 kubelet[1951]: E0515 10:39:03.563729 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.563744 kubelet[1951]: W0515 10:39:03.563741 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.563844 kubelet[1951]: E0515 10:39:03.563809 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.564021 kubelet[1951]: E0515 10:39:03.563999 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.564021 kubelet[1951]: W0515 10:39:03.564013 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.564177 kubelet[1951]: E0515 10:39:03.564078 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.564222 kubelet[1951]: E0515 10:39:03.564188 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.564222 kubelet[1951]: W0515 10:39:03.564201 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.564222 kubelet[1951]: E0515 10:39:03.564213 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.564508 kubelet[1951]: E0515 10:39:03.564486 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.564508 kubelet[1951]: W0515 10:39:03.564504 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.564599 kubelet[1951]: E0515 10:39:03.564581 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.564796 kubelet[1951]: E0515 10:39:03.564769 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.564796 kubelet[1951]: W0515 10:39:03.564794 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.564890 kubelet[1951]: E0515 10:39:03.564840 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.565061 kubelet[1951]: E0515 10:39:03.565044 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.565061 kubelet[1951]: W0515 10:39:03.565059 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.565150 kubelet[1951]: E0515 10:39:03.565097 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.565303 kubelet[1951]: E0515 10:39:03.565285 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.565303 kubelet[1951]: W0515 10:39:03.565301 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.565434 kubelet[1951]: E0515 10:39:03.565339 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.565556 kubelet[1951]: E0515 10:39:03.565538 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.565556 kubelet[1951]: W0515 10:39:03.565555 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.565831 kubelet[1951]: E0515 10:39:03.565801 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.565909 kubelet[1951]: E0515 10:39:03.565815 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.565909 kubelet[1951]: W0515 10:39:03.565906 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.565973 kubelet[1951]: E0515 10:39:03.565921 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.566214 kubelet[1951]: E0515 10:39:03.566194 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.566214 kubelet[1951]: W0515 10:39:03.566211 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.566313 kubelet[1951]: E0515 10:39:03.566240 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.566508 kubelet[1951]: E0515 10:39:03.566490 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.566508 kubelet[1951]: W0515 10:39:03.566506 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.566603 kubelet[1951]: E0515 10:39:03.566545 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.566763 kubelet[1951]: E0515 10:39:03.566737 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.566763 kubelet[1951]: W0515 10:39:03.566751 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.567006 kubelet[1951]: E0515 10:39:03.566800 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.567006 kubelet[1951]: E0515 10:39:03.566908 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.567006 kubelet[1951]: W0515 10:39:03.566916 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.567291 kubelet[1951]: E0515 10:39:03.567267 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.568126 kubelet[1951]: E0515 10:39:03.568096 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.568126 kubelet[1951]: W0515 10:39:03.568112 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.568126 kubelet[1951]: E0515 10:39:03.568129 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.568387 kubelet[1951]: E0515 10:39:03.568348 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.568387 kubelet[1951]: W0515 10:39:03.568360 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.568514 kubelet[1951]: E0515 10:39:03.568421 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.568671 kubelet[1951]: E0515 10:39:03.568647 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.568671 kubelet[1951]: W0515 10:39:03.568661 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.568671 kubelet[1951]: E0515 10:39:03.568670 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.577065 kubelet[1951]: E0515 10:39:03.577029 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:03.577206 kubelet[1951]: W0515 10:39:03.577171 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:03.577206 kubelet[1951]: E0515 10:39:03.577200 1951 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:03.601234 kubelet[1951]: E0515 10:39:03.601201 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:03.601871 env[1217]: time="2025-05-15T10:39:03.601819746Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fcvxt,Uid:0d4523d4-f92b-4c2a-9495-ec79a03e5e5a,Namespace:calico-system,Attempt:0,}" May 15 10:39:03.630203 env[1217]: time="2025-05-15T10:39:03.630114738Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:03.630203 env[1217]: time="2025-05-15T10:39:03.630160414Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:03.630203 env[1217]: time="2025-05-15T10:39:03.630170504Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:03.631055 env[1217]: time="2025-05-15T10:39:03.630290720Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f01079a7cec99d3acdfbd8e89c0d24a238dbac944da8ce61c4ccc0a10cdc4cc1 pid=2426 runtime=io.containerd.runc.v2 May 15 10:39:03.633312 env[1217]: time="2025-05-15T10:39:03.633233286Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:03.633396 env[1217]: time="2025-05-15T10:39:03.633322635Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:03.633396 env[1217]: time="2025-05-15T10:39:03.633375965Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:03.633666 env[1217]: time="2025-05-15T10:39:03.633607763Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b956419c2dc3c52ef6db5c00919af0cb8a4828f2b6fff2f0f0540541375b14cc pid=2443 runtime=io.containerd.runc.v2 May 15 10:39:03.639000 audit[2468]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2468 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:03.639000 audit[2468]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffdb6d45c60 a2=0 a3=7ffdb6d45c4c items=0 ppid=2102 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:03.639000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:03.641285 systemd[1]: Started cri-containerd-f01079a7cec99d3acdfbd8e89c0d24a238dbac944da8ce61c4ccc0a10cdc4cc1.scope. May 15 10:39:03.645000 audit[2468]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2468 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:03.645000 audit[2468]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdb6d45c60 a2=0 a3=0 items=0 ppid=2102 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:03.645000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:03.648256 systemd[1]: Started cri-containerd-b956419c2dc3c52ef6db5c00919af0cb8a4828f2b6fff2f0f0540541375b14cc.scope. May 15 10:39:03.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.656000 audit: BPF prog-id=118 op=LOAD May 15 10:39:03.657000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2426 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:03.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630313037396137636563393964336163646662643865383963306432 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2426 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:03.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630313037396137636563393964336163646662643865383963306432 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit: BPF prog-id=119 op=LOAD May 15 10:39:03.657000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001c8f20 items=0 ppid=2426 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:03.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630313037396137636563393964336163646662643865383963306432 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit: BPF prog-id=120 op=LOAD May 15 10:39:03.657000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001c8f68 items=0 ppid=2426 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:03.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630313037396137636563393964336163646662643865383963306432 May 15 10:39:03.657000 audit: BPF prog-id=120 op=UNLOAD May 15 10:39:03.657000 audit: BPF prog-id=119 op=UNLOAD May 15 10:39:03.657000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.657000 audit: BPF prog-id=121 op=LOAD May 15 10:39:03.657000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c9378 items=0 ppid=2426 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:03.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630313037396137636563393964336163646662643865383963306432 May 15 10:39:03.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.659000 audit: BPF prog-id=122 op=LOAD May 15 10:39:03.659000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.659000 audit[2459]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2443 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:03.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353634313963326463336335326566366462356330303931396166 May 15 10:39:03.659000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.659000 audit[2459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2443 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:03.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353634313963326463336335326566366462356330303931396166 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit: BPF prog-id=123 op=LOAD May 15 10:39:03.660000 audit[2459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000309740 items=0 ppid=2443 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:03.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353634313963326463336335326566366462356330303931396166 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit: BPF prog-id=124 op=LOAD May 15 10:39:03.660000 audit[2459]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000309788 items=0 ppid=2443 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:03.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353634313963326463336335326566366462356330303931396166 May 15 10:39:03.660000 audit: BPF prog-id=124 op=UNLOAD May 15 10:39:03.660000 audit: BPF prog-id=123 op=UNLOAD May 15 10:39:03.660000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:03.660000 audit: BPF prog-id=125 op=LOAD May 15 10:39:03.660000 audit[2459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000309b98 items=0 ppid=2443 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:03.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353634313963326463336335326566366462356330303931396166 May 15 10:39:03.671185 env[1217]: time="2025-05-15T10:39:03.671126381Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fcvxt,Uid:0d4523d4-f92b-4c2a-9495-ec79a03e5e5a,Namespace:calico-system,Attempt:0,} returns sandbox id \"b956419c2dc3c52ef6db5c00919af0cb8a4828f2b6fff2f0f0540541375b14cc\"" May 15 10:39:03.673247 kubelet[1951]: E0515 10:39:03.671809 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:03.675552 env[1217]: time="2025-05-15T10:39:03.675518262Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 10:39:03.686769 env[1217]: time="2025-05-15T10:39:03.686706136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7f9d5586-zs9h4,Uid:a65fcea1-f42a-4423-92e5-7181cab032f7,Namespace:calico-system,Attempt:0,} returns sandbox id \"f01079a7cec99d3acdfbd8e89c0d24a238dbac944da8ce61c4ccc0a10cdc4cc1\"" May 15 10:39:03.687293 kubelet[1951]: E0515 10:39:03.687261 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:04.848267 kubelet[1951]: E0515 10:39:04.848213 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b7nq8" podUID="5de422bf-365e-4b7f-b2a7-451d003a44f6" May 15 10:39:05.155895 env[1217]: time="2025-05-15T10:39:05.155745262Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:05.157487 env[1217]: time="2025-05-15T10:39:05.157444557Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:05.158650 env[1217]: time="2025-05-15T10:39:05.158616077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:05.160016 env[1217]: time="2025-05-15T10:39:05.159981514Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:05.160419 env[1217]: time="2025-05-15T10:39:05.160393831Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 10:39:05.161555 env[1217]: time="2025-05-15T10:39:05.161516560Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 15 10:39:05.162511 env[1217]: time="2025-05-15T10:39:05.162208935Z" level=info msg="CreateContainer within sandbox \"b956419c2dc3c52ef6db5c00919af0cb8a4828f2b6fff2f0f0540541375b14cc\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 10:39:05.176331 env[1217]: time="2025-05-15T10:39:05.176284951Z" level=info msg="CreateContainer within sandbox \"b956419c2dc3c52ef6db5c00919af0cb8a4828f2b6fff2f0f0540541375b14cc\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"848450886247c4870b682af080f236fb8dc170dbff41f5f0c8a718196a5c291c\"" May 15 10:39:05.176795 env[1217]: time="2025-05-15T10:39:05.176758183Z" level=info msg="StartContainer for \"848450886247c4870b682af080f236fb8dc170dbff41f5f0c8a718196a5c291c\"" May 15 10:39:05.198595 systemd[1]: Started cri-containerd-848450886247c4870b682af080f236fb8dc170dbff41f5f0c8a718196a5c291c.scope. May 15 10:39:05.211000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.211000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7efd9c023c68 items=0 ppid=2443 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:05.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383435303838363234376334383730623638326166303830663233 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit: BPF prog-id=126 op=LOAD May 15 10:39:05.212000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c00009f478 items=0 ppid=2443 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:05.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383435303838363234376334383730623638326166303830663233 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit: BPF prog-id=127 op=LOAD May 15 10:39:05.212000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c00009f4c8 items=0 ppid=2443 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:05.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383435303838363234376334383730623638326166303830663233 May 15 10:39:05.212000 audit: BPF prog-id=127 op=UNLOAD May 15 10:39:05.212000 audit: BPF prog-id=126 op=UNLOAD May 15 10:39:05.212000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:05.212000 audit: BPF prog-id=128 op=LOAD May 15 10:39:05.212000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c00009f558 items=0 ppid=2443 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:05.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383435303838363234376334383730623638326166303830663233 May 15 10:39:05.226928 env[1217]: time="2025-05-15T10:39:05.226872387Z" level=info msg="StartContainer for \"848450886247c4870b682af080f236fb8dc170dbff41f5f0c8a718196a5c291c\" returns successfully" May 15 10:39:05.236321 systemd[1]: cri-containerd-848450886247c4870b682af080f236fb8dc170dbff41f5f0c8a718196a5c291c.scope: Deactivated successfully. May 15 10:39:05.239000 audit: BPF prog-id=128 op=UNLOAD May 15 10:39:05.336599 env[1217]: time="2025-05-15T10:39:05.336531227Z" level=info msg="shim disconnected" id=848450886247c4870b682af080f236fb8dc170dbff41f5f0c8a718196a5c291c May 15 10:39:05.336599 env[1217]: time="2025-05-15T10:39:05.336588424Z" level=warning msg="cleaning up after shim disconnected" id=848450886247c4870b682af080f236fb8dc170dbff41f5f0c8a718196a5c291c namespace=k8s.io May 15 10:39:05.336599 env[1217]: time="2025-05-15T10:39:05.336598192Z" level=info msg="cleaning up dead shim" May 15 10:39:05.339266 systemd[1]: run-containerd-runc-k8s.io-848450886247c4870b682af080f236fb8dc170dbff41f5f0c8a718196a5c291c-runc.5uw2fF.mount: Deactivated successfully. May 15 10:39:05.339377 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-848450886247c4870b682af080f236fb8dc170dbff41f5f0c8a718196a5c291c-rootfs.mount: Deactivated successfully. May 15 10:39:05.343699 env[1217]: time="2025-05-15T10:39:05.343644185Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2545 runtime=io.containerd.runc.v2\n" May 15 10:39:05.891747 kubelet[1951]: E0515 10:39:05.891708 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:06.588659 update_engine[1204]: I0515 10:39:06.588593 1204 update_attempter.cc:509] Updating boot flags... May 15 10:39:06.848679 kubelet[1951]: E0515 10:39:06.848515 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b7nq8" podUID="5de422bf-365e-4b7f-b2a7-451d003a44f6" May 15 10:39:08.848556 kubelet[1951]: E0515 10:39:08.848483 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b7nq8" podUID="5de422bf-365e-4b7f-b2a7-451d003a44f6" May 15 10:39:09.440640 env[1217]: time="2025-05-15T10:39:09.440568180Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:09.442324 env[1217]: time="2025-05-15T10:39:09.442271609Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:09.443668 env[1217]: time="2025-05-15T10:39:09.443641780Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:09.445054 env[1217]: time="2025-05-15T10:39:09.444998597Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:09.445361 env[1217]: time="2025-05-15T10:39:09.445326814Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 15 10:39:09.446479 env[1217]: time="2025-05-15T10:39:09.446322922Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 10:39:09.452528 env[1217]: time="2025-05-15T10:39:09.452491534Z" level=info msg="CreateContainer within sandbox \"f01079a7cec99d3acdfbd8e89c0d24a238dbac944da8ce61c4ccc0a10cdc4cc1\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 15 10:39:09.468314 env[1217]: time="2025-05-15T10:39:09.468232832Z" level=info msg="CreateContainer within sandbox \"f01079a7cec99d3acdfbd8e89c0d24a238dbac944da8ce61c4ccc0a10cdc4cc1\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"58711744879e4dcfe357231e53cde06b90169de143c2345bcb455f7e660e305b\"" May 15 10:39:09.469042 env[1217]: time="2025-05-15T10:39:09.468983757Z" level=info msg="StartContainer for \"58711744879e4dcfe357231e53cde06b90169de143c2345bcb455f7e660e305b\"" May 15 10:39:09.484614 systemd[1]: Started cri-containerd-58711744879e4dcfe357231e53cde06b90169de143c2345bcb455f7e660e305b.scope. May 15 10:39:09.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.498432 kernel: kauditd_printk_skb: 166 callbacks suppressed May 15 10:39:09.498549 kernel: audit: type=1400 audit(1747305549.495:975): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.503907 kernel: audit: type=1400 audit(1747305549.495:976): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.503971 kernel: audit: type=1400 audit(1747305549.495:977): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.507091 kernel: audit: type=1400 audit(1747305549.495:978): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.510290 kernel: audit: type=1400 audit(1747305549.495:979): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.516718 kernel: audit: type=1400 audit(1747305549.495:980): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.516795 kernel: audit: type=1400 audit(1747305549.495:981): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.523257 kernel: audit: type=1400 audit(1747305549.495:982): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.523304 kernel: audit: type=1400 audit(1747305549.495:983): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.529837 kernel: audit: type=1400 audit(1747305549.496:984): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.496000 audit: BPF prog-id=129 op=LOAD May 15 10:39:09.501000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.501000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2426 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:09.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538373131373434383739653464636665333537323331653533636465 May 15 10:39:09.501000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.501000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2426 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:09.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538373131373434383739653464636665333537323331653533636465 May 15 10:39:09.501000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.501000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.501000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.501000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.501000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.501000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.501000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.501000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.501000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.501000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.501000 audit: BPF prog-id=130 op=LOAD May 15 10:39:09.501000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c00029a9c0 items=0 ppid=2426 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:09.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538373131373434383739653464636665333537323331653533636465 May 15 10:39:09.502000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.502000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.502000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.502000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.502000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.502000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.502000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.502000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.502000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.502000 audit: BPF prog-id=131 op=LOAD May 15 10:39:09.502000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c00029aa08 items=0 ppid=2426 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:09.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538373131373434383739653464636665333537323331653533636465 May 15 10:39:09.508000 audit: BPF prog-id=131 op=UNLOAD May 15 10:39:09.508000 audit: BPF prog-id=130 op=UNLOAD May 15 10:39:09.508000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.508000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.508000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.508000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.508000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.508000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.508000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.508000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.508000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.508000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:09.508000 audit: BPF prog-id=132 op=LOAD May 15 10:39:09.508000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c00029ae18 items=0 ppid=2426 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:09.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538373131373434383739653464636665333537323331653533636465 May 15 10:39:09.550593 env[1217]: time="2025-05-15T10:39:09.550521642Z" level=info msg="StartContainer for \"58711744879e4dcfe357231e53cde06b90169de143c2345bcb455f7e660e305b\" returns successfully" May 15 10:39:09.900426 kubelet[1951]: E0515 10:39:09.900261 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:10.848900 kubelet[1951]: E0515 10:39:10.848831 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b7nq8" podUID="5de422bf-365e-4b7f-b2a7-451d003a44f6" May 15 10:39:10.901505 kubelet[1951]: I0515 10:39:10.901458 1951 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:39:10.901882 kubelet[1951]: E0515 10:39:10.901845 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:12.848586 kubelet[1951]: E0515 10:39:12.848507 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b7nq8" podUID="5de422bf-365e-4b7f-b2a7-451d003a44f6" May 15 10:39:14.848652 kubelet[1951]: E0515 10:39:14.848594 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b7nq8" podUID="5de422bf-365e-4b7f-b2a7-451d003a44f6" May 15 10:39:16.848142 kubelet[1951]: E0515 10:39:16.848076 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b7nq8" podUID="5de422bf-365e-4b7f-b2a7-451d003a44f6" May 15 10:39:17.126069 env[1217]: time="2025-05-15T10:39:17.125942212Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:17.127886 env[1217]: time="2025-05-15T10:39:17.127828849Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:17.129193 env[1217]: time="2025-05-15T10:39:17.129159542Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:17.130728 env[1217]: time="2025-05-15T10:39:17.130700640Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:17.131179 env[1217]: time="2025-05-15T10:39:17.131144335Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 10:39:17.137145 env[1217]: time="2025-05-15T10:39:17.137108763Z" level=info msg="CreateContainer within sandbox \"b956419c2dc3c52ef6db5c00919af0cb8a4828f2b6fff2f0f0540541375b14cc\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 10:39:17.149454 env[1217]: time="2025-05-15T10:39:17.149407222Z" level=info msg="CreateContainer within sandbox \"b956419c2dc3c52ef6db5c00919af0cb8a4828f2b6fff2f0f0540541375b14cc\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"2fea8a2a6977cd3f8aaab56e4d5738aa98d72fa4503e8606a8dd8566fa4203e3\"" May 15 10:39:17.150155 env[1217]: time="2025-05-15T10:39:17.150116877Z" level=info msg="StartContainer for \"2fea8a2a6977cd3f8aaab56e4d5738aa98d72fa4503e8606a8dd8566fa4203e3\"" May 15 10:39:17.174719 systemd[1]: run-containerd-runc-k8s.io-2fea8a2a6977cd3f8aaab56e4d5738aa98d72fa4503e8606a8dd8566fa4203e3-runc.XpGMks.mount: Deactivated successfully. May 15 10:39:17.177770 systemd[1]: Started cri-containerd-2fea8a2a6977cd3f8aaab56e4d5738aa98d72fa4503e8606a8dd8566fa4203e3.scope. May 15 10:39:17.202000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.205423 kernel: kauditd_printk_skb: 47 callbacks suppressed May 15 10:39:17.205590 kernel: audit: type=1400 audit(1747305557.202:993): avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.202000 audit[2626]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f311c9a0da8 items=0 ppid=2443 pid=2626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:17.213197 kernel: audit: type=1300 audit(1747305557.202:993): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f311c9a0da8 items=0 ppid=2443 pid=2626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:17.213269 kernel: audit: type=1327 audit(1747305557.202:993): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266656138613261363937376364336638616161623536653464353733 May 15 10:39:17.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266656138613261363937376364336638616161623536653464353733 May 15 10:39:17.202000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.221081 kernel: audit: type=1400 audit(1747305557.202:994): avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.221124 kernel: audit: type=1400 audit(1747305557.202:994): avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.202000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.202000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.227406 kernel: audit: type=1400 audit(1747305557.202:994): avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.227503 kernel: audit: type=1400 audit(1747305557.202:994): avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.202000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.230564 kernel: audit: type=1400 audit(1747305557.202:994): avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.202000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.233884 kernel: audit: type=1400 audit(1747305557.202:994): avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.202000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.237283 kernel: audit: type=1400 audit(1747305557.202:994): avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.202000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.202000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.202000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.202000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.202000 audit: BPF prog-id=133 op=LOAD May 15 10:39:17.202000 audit[2626]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002dec38 items=0 ppid=2443 pid=2626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:17.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266656138613261363937376364336638616161623536653464353733 May 15 10:39:17.213000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.213000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.213000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.213000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.213000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.213000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.213000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.213000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.213000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.213000 audit: BPF prog-id=134 op=LOAD May 15 10:39:17.213000 audit[2626]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002dec88 items=0 ppid=2443 pid=2626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:17.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266656138613261363937376364336638616161623536653464353733 May 15 10:39:17.223000 audit: BPF prog-id=134 op=UNLOAD May 15 10:39:17.223000 audit: BPF prog-id=133 op=UNLOAD May 15 10:39:17.223000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.223000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.223000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.223000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.223000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.223000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.223000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.223000 audit[2626]: AVC avc: denied { perfmon } for pid=2626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.223000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.223000 audit[2626]: AVC avc: denied { bpf } for pid=2626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.223000 audit: BPF prog-id=135 op=LOAD May 15 10:39:17.223000 audit[2626]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002ded18 items=0 ppid=2443 pid=2626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:17.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266656138613261363937376364336638616161623536653464353733 May 15 10:39:17.805837 env[1217]: time="2025-05-15T10:39:17.805766178Z" level=info msg="StartContainer for \"2fea8a2a6977cd3f8aaab56e4d5738aa98d72fa4503e8606a8dd8566fa4203e3\" returns successfully" May 15 10:39:17.811983 systemd[1]: Started sshd@7-10.0.0.52:22-10.0.0.1:39136.service. May 15 10:39:17.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.52:22-10.0.0.1:39136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:17.854000 audit[2653]: USER_ACCT pid=2653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:17.854852 sshd[2653]: Accepted publickey for core from 10.0.0.1 port 39136 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:17.855000 audit[2653]: CRED_ACQ pid=2653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:17.855000 audit[2653]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce1995b80 a2=3 a3=0 items=0 ppid=1 pid=2653 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:17.855000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:17.855868 sshd[2653]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:17.860065 systemd-logind[1201]: New session 8 of user core. May 15 10:39:17.860904 systemd[1]: Started session-8.scope. May 15 10:39:17.865000 audit[2653]: USER_START pid=2653 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:17.866000 audit[2655]: CRED_ACQ pid=2655 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:18.271087 kubelet[1951]: E0515 10:39:18.271032 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:18.320796 kubelet[1951]: I0515 10:39:18.320726 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7f9d5586-zs9h4" podStartSLOduration=10.561833309 podStartE2EDuration="16.319896471s" podCreationTimestamp="2025-05-15 10:39:02 +0000 UTC" firstStartedPulling="2025-05-15 10:39:03.688059862 +0000 UTC m=+13.917537681" lastFinishedPulling="2025-05-15 10:39:09.446123025 +0000 UTC m=+19.675600843" observedRunningTime="2025-05-15 10:39:09.914025819 +0000 UTC m=+20.143503637" watchObservedRunningTime="2025-05-15 10:39:18.319896471 +0000 UTC m=+28.549374289" May 15 10:39:18.379576 sshd[2653]: pam_unix(sshd:session): session closed for user core May 15 10:39:18.381000 audit[2653]: USER_END pid=2653 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:18.381000 audit[2653]: CRED_DISP pid=2653 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:18.383604 systemd[1]: sshd@7-10.0.0.52:22-10.0.0.1:39136.service: Deactivated successfully. May 15 10:39:18.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.52:22-10.0.0.1:39136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:18.384655 systemd[1]: session-8.scope: Deactivated successfully. May 15 10:39:18.385270 systemd-logind[1201]: Session 8 logged out. Waiting for processes to exit. May 15 10:39:18.386088 systemd-logind[1201]: Removed session 8. May 15 10:39:18.847967 kubelet[1951]: E0515 10:39:18.847910 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b7nq8" podUID="5de422bf-365e-4b7f-b2a7-451d003a44f6" May 15 10:39:19.025760 env[1217]: time="2025-05-15T10:39:19.025704027Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:39:19.027457 systemd[1]: cri-containerd-2fea8a2a6977cd3f8aaab56e4d5738aa98d72fa4503e8606a8dd8566fa4203e3.scope: Deactivated successfully. May 15 10:39:19.032000 audit: BPF prog-id=135 op=UNLOAD May 15 10:39:19.044345 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2fea8a2a6977cd3f8aaab56e4d5738aa98d72fa4503e8606a8dd8566fa4203e3-rootfs.mount: Deactivated successfully. May 15 10:39:19.052775 env[1217]: time="2025-05-15T10:39:19.052732102Z" level=info msg="shim disconnected" id=2fea8a2a6977cd3f8aaab56e4d5738aa98d72fa4503e8606a8dd8566fa4203e3 May 15 10:39:19.052876 env[1217]: time="2025-05-15T10:39:19.052777938Z" level=warning msg="cleaning up after shim disconnected" id=2fea8a2a6977cd3f8aaab56e4d5738aa98d72fa4503e8606a8dd8566fa4203e3 namespace=k8s.io May 15 10:39:19.052876 env[1217]: time="2025-05-15T10:39:19.052790402Z" level=info msg="cleaning up dead shim" May 15 10:39:19.058587 env[1217]: time="2025-05-15T10:39:19.058541906Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2680 runtime=io.containerd.runc.v2\n" May 15 10:39:19.120456 kubelet[1951]: I0515 10:39:19.120305 1951 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 15 10:39:19.148399 systemd[1]: Created slice kubepods-burstable-pod78023a57_4294_4669_bd3b_842d5d20e076.slice. May 15 10:39:19.156155 systemd[1]: Created slice kubepods-besteffort-podad701ce2_5ac1_471a_bae9_111eca92acb6.slice. May 15 10:39:19.160593 systemd[1]: Created slice kubepods-besteffort-pod486bd89b_05b8_49ca_8103_b4cb3d3a867d.slice. May 15 10:39:19.166229 systemd[1]: Created slice kubepods-besteffort-podd27729e0_fe3d_4ead_899b_fa0ef12160ff.slice. May 15 10:39:19.171236 systemd[1]: Created slice kubepods-burstable-podc26a27ad_f260_4d01_a93f_c6cf02296653.slice. May 15 10:39:19.271360 kubelet[1951]: I0515 10:39:19.271318 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d27729e0-fe3d-4ead-899b-fa0ef12160ff-calico-apiserver-certs\") pod \"calico-apiserver-c6767cb7f-vt2wp\" (UID: \"d27729e0-fe3d-4ead-899b-fa0ef12160ff\") " pod="calico-apiserver/calico-apiserver-c6767cb7f-vt2wp" May 15 10:39:19.271854 kubelet[1951]: I0515 10:39:19.271386 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ts2jj\" (UniqueName: \"kubernetes.io/projected/ad701ce2-5ac1-471a-bae9-111eca92acb6-kube-api-access-ts2jj\") pod \"calico-kube-controllers-55d6dc944c-d6zgh\" (UID: \"ad701ce2-5ac1-471a-bae9-111eca92acb6\") " pod="calico-system/calico-kube-controllers-55d6dc944c-d6zgh" May 15 10:39:19.271854 kubelet[1951]: I0515 10:39:19.271416 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ad701ce2-5ac1-471a-bae9-111eca92acb6-tigera-ca-bundle\") pod \"calico-kube-controllers-55d6dc944c-d6zgh\" (UID: \"ad701ce2-5ac1-471a-bae9-111eca92acb6\") " pod="calico-system/calico-kube-controllers-55d6dc944c-d6zgh" May 15 10:39:19.271854 kubelet[1951]: I0515 10:39:19.271437 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/78023a57-4294-4669-bd3b-842d5d20e076-config-volume\") pod \"coredns-668d6bf9bc-cjkpq\" (UID: \"78023a57-4294-4669-bd3b-842d5d20e076\") " pod="kube-system/coredns-668d6bf9bc-cjkpq" May 15 10:39:19.271854 kubelet[1951]: I0515 10:39:19.271457 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xjx6h\" (UniqueName: \"kubernetes.io/projected/d27729e0-fe3d-4ead-899b-fa0ef12160ff-kube-api-access-xjx6h\") pod \"calico-apiserver-c6767cb7f-vt2wp\" (UID: \"d27729e0-fe3d-4ead-899b-fa0ef12160ff\") " pod="calico-apiserver/calico-apiserver-c6767cb7f-vt2wp" May 15 10:39:19.271854 kubelet[1951]: I0515 10:39:19.271474 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-55f9f\" (UniqueName: \"kubernetes.io/projected/c26a27ad-f260-4d01-a93f-c6cf02296653-kube-api-access-55f9f\") pod \"coredns-668d6bf9bc-nknfx\" (UID: \"c26a27ad-f260-4d01-a93f-c6cf02296653\") " pod="kube-system/coredns-668d6bf9bc-nknfx" May 15 10:39:19.272053 kubelet[1951]: I0515 10:39:19.271494 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/486bd89b-05b8-49ca-8103-b4cb3d3a867d-calico-apiserver-certs\") pod \"calico-apiserver-c6767cb7f-5grml\" (UID: \"486bd89b-05b8-49ca-8103-b4cb3d3a867d\") " pod="calico-apiserver/calico-apiserver-c6767cb7f-5grml" May 15 10:39:19.272053 kubelet[1951]: I0515 10:39:19.271516 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-92gnt\" (UniqueName: \"kubernetes.io/projected/486bd89b-05b8-49ca-8103-b4cb3d3a867d-kube-api-access-92gnt\") pod \"calico-apiserver-c6767cb7f-5grml\" (UID: \"486bd89b-05b8-49ca-8103-b4cb3d3a867d\") " pod="calico-apiserver/calico-apiserver-c6767cb7f-5grml" May 15 10:39:19.272053 kubelet[1951]: I0515 10:39:19.271535 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c26a27ad-f260-4d01-a93f-c6cf02296653-config-volume\") pod \"coredns-668d6bf9bc-nknfx\" (UID: \"c26a27ad-f260-4d01-a93f-c6cf02296653\") " pod="kube-system/coredns-668d6bf9bc-nknfx" May 15 10:39:19.272053 kubelet[1951]: I0515 10:39:19.271554 1951 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l5j8x\" (UniqueName: \"kubernetes.io/projected/78023a57-4294-4669-bd3b-842d5d20e076-kube-api-access-l5j8x\") pod \"coredns-668d6bf9bc-cjkpq\" (UID: \"78023a57-4294-4669-bd3b-842d5d20e076\") " pod="kube-system/coredns-668d6bf9bc-cjkpq" May 15 10:39:19.274145 kubelet[1951]: E0515 10:39:19.274119 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:19.274821 env[1217]: time="2025-05-15T10:39:19.274780518Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 10:39:19.457970 kubelet[1951]: E0515 10:39:19.457940 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:19.473021 env[1217]: time="2025-05-15T10:39:19.472985896Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-cjkpq,Uid:78023a57-4294-4669-bd3b-842d5d20e076,Namespace:kube-system,Attempt:0,}" May 15 10:39:19.473021 env[1217]: time="2025-05-15T10:39:19.472986317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55d6dc944c-d6zgh,Uid:ad701ce2-5ac1-471a-bae9-111eca92acb6,Namespace:calico-system,Attempt:0,}" May 15 10:39:19.473141 env[1217]: time="2025-05-15T10:39:19.472985716Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c6767cb7f-5grml,Uid:486bd89b-05b8-49ca-8103-b4cb3d3a867d,Namespace:calico-apiserver,Attempt:0,}" May 15 10:39:19.473190 env[1217]: time="2025-05-15T10:39:19.472986427Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c6767cb7f-vt2wp,Uid:d27729e0-fe3d-4ead-899b-fa0ef12160ff,Namespace:calico-apiserver,Attempt:0,}" May 15 10:39:19.473308 kubelet[1951]: E0515 10:39:19.473280 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:19.473600 env[1217]: time="2025-05-15T10:39:19.473574783Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-nknfx,Uid:c26a27ad-f260-4d01-a93f-c6cf02296653,Namespace:kube-system,Attempt:0,}" May 15 10:39:19.601420 env[1217]: time="2025-05-15T10:39:19.601331691Z" level=error msg="Failed to destroy network for sandbox \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.601838 env[1217]: time="2025-05-15T10:39:19.601803368Z" level=error msg="encountered an error cleaning up failed sandbox \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.601910 env[1217]: time="2025-05-15T10:39:19.601856948Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c6767cb7f-vt2wp,Uid:d27729e0-fe3d-4ead-899b-fa0ef12160ff,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.602117 kubelet[1951]: E0515 10:39:19.602079 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.602308 kubelet[1951]: E0515 10:39:19.602155 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-c6767cb7f-vt2wp" May 15 10:39:19.602308 kubelet[1951]: E0515 10:39:19.602176 1951 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-c6767cb7f-vt2wp" May 15 10:39:19.602308 kubelet[1951]: E0515 10:39:19.602219 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-c6767cb7f-vt2wp_calico-apiserver(d27729e0-fe3d-4ead-899b-fa0ef12160ff)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-c6767cb7f-vt2wp_calico-apiserver(d27729e0-fe3d-4ead-899b-fa0ef12160ff)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-c6767cb7f-vt2wp" podUID="d27729e0-fe3d-4ead-899b-fa0ef12160ff" May 15 10:39:19.619517 env[1217]: time="2025-05-15T10:39:19.619424407Z" level=error msg="Failed to destroy network for sandbox \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.619913 env[1217]: time="2025-05-15T10:39:19.619871978Z" level=error msg="encountered an error cleaning up failed sandbox \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.619998 env[1217]: time="2025-05-15T10:39:19.619941630Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-cjkpq,Uid:78023a57-4294-4669-bd3b-842d5d20e076,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.620229 kubelet[1951]: E0515 10:39:19.620186 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.620329 kubelet[1951]: E0515 10:39:19.620252 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-cjkpq" May 15 10:39:19.620329 kubelet[1951]: E0515 10:39:19.620277 1951 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-cjkpq" May 15 10:39:19.620431 kubelet[1951]: E0515 10:39:19.620316 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-cjkpq_kube-system(78023a57-4294-4669-bd3b-842d5d20e076)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-cjkpq_kube-system(78023a57-4294-4669-bd3b-842d5d20e076)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-cjkpq" podUID="78023a57-4294-4669-bd3b-842d5d20e076" May 15 10:39:19.620900 env[1217]: time="2025-05-15T10:39:19.620822816Z" level=error msg="Failed to destroy network for sandbox \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.622063 env[1217]: time="2025-05-15T10:39:19.622021340Z" level=error msg="encountered an error cleaning up failed sandbox \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.622165 env[1217]: time="2025-05-15T10:39:19.622084688Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-nknfx,Uid:c26a27ad-f260-4d01-a93f-c6cf02296653,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.622455 kubelet[1951]: E0515 10:39:19.622420 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.622548 kubelet[1951]: E0515 10:39:19.622478 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-nknfx" May 15 10:39:19.622548 kubelet[1951]: E0515 10:39:19.622498 1951 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-nknfx" May 15 10:39:19.622641 kubelet[1951]: E0515 10:39:19.622536 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-nknfx_kube-system(c26a27ad-f260-4d01-a93f-c6cf02296653)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-nknfx_kube-system(c26a27ad-f260-4d01-a93f-c6cf02296653)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-nknfx" podUID="c26a27ad-f260-4d01-a93f-c6cf02296653" May 15 10:39:19.625118 env[1217]: time="2025-05-15T10:39:19.625016611Z" level=error msg="Failed to destroy network for sandbox \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.625445 env[1217]: time="2025-05-15T10:39:19.625413076Z" level=error msg="encountered an error cleaning up failed sandbox \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.625530 env[1217]: time="2025-05-15T10:39:19.625461627Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c6767cb7f-5grml,Uid:486bd89b-05b8-49ca-8103-b4cb3d3a867d,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.625666 kubelet[1951]: E0515 10:39:19.625617 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.625754 kubelet[1951]: E0515 10:39:19.625686 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-c6767cb7f-5grml" May 15 10:39:19.625754 kubelet[1951]: E0515 10:39:19.625712 1951 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-c6767cb7f-5grml" May 15 10:39:19.625827 kubelet[1951]: E0515 10:39:19.625746 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-c6767cb7f-5grml_calico-apiserver(486bd89b-05b8-49ca-8103-b4cb3d3a867d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-c6767cb7f-5grml_calico-apiserver(486bd89b-05b8-49ca-8103-b4cb3d3a867d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-c6767cb7f-5grml" podUID="486bd89b-05b8-49ca-8103-b4cb3d3a867d" May 15 10:39:19.634870 env[1217]: time="2025-05-15T10:39:19.634803090Z" level=error msg="Failed to destroy network for sandbox \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.635255 env[1217]: time="2025-05-15T10:39:19.635220615Z" level=error msg="encountered an error cleaning up failed sandbox \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.635321 env[1217]: time="2025-05-15T10:39:19.635282722Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55d6dc944c-d6zgh,Uid:ad701ce2-5ac1-471a-bae9-111eca92acb6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.635538 kubelet[1951]: E0515 10:39:19.635500 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:19.635605 kubelet[1951]: E0515 10:39:19.635556 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55d6dc944c-d6zgh" May 15 10:39:19.635605 kubelet[1951]: E0515 10:39:19.635572 1951 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55d6dc944c-d6zgh" May 15 10:39:19.635695 kubelet[1951]: E0515 10:39:19.635610 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-55d6dc944c-d6zgh_calico-system(ad701ce2-5ac1-471a-bae9-111eca92acb6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-55d6dc944c-d6zgh_calico-system(ad701ce2-5ac1-471a-bae9-111eca92acb6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55d6dc944c-d6zgh" podUID="ad701ce2-5ac1-471a-bae9-111eca92acb6" May 15 10:39:20.045719 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e-shm.mount: Deactivated successfully. May 15 10:39:20.276817 kubelet[1951]: I0515 10:39:20.276779 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" May 15 10:39:20.277465 env[1217]: time="2025-05-15T10:39:20.277431359Z" level=info msg="StopPodSandbox for \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\"" May 15 10:39:20.277835 kubelet[1951]: I0515 10:39:20.277769 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" May 15 10:39:20.278298 env[1217]: time="2025-05-15T10:39:20.278264485Z" level=info msg="StopPodSandbox for \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\"" May 15 10:39:20.279295 kubelet[1951]: I0515 10:39:20.279242 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" May 15 10:39:20.279867 env[1217]: time="2025-05-15T10:39:20.279821992Z" level=info msg="StopPodSandbox for \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\"" May 15 10:39:20.281289 kubelet[1951]: I0515 10:39:20.281250 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" May 15 10:39:20.282503 env[1217]: time="2025-05-15T10:39:20.282466003Z" level=info msg="StopPodSandbox for \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\"" May 15 10:39:20.283304 kubelet[1951]: I0515 10:39:20.283272 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" May 15 10:39:20.283873 env[1217]: time="2025-05-15T10:39:20.283819738Z" level=info msg="StopPodSandbox for \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\"" May 15 10:39:20.330746 env[1217]: time="2025-05-15T10:39:20.330600929Z" level=error msg="StopPodSandbox for \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\" failed" error="failed to destroy network for sandbox \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:20.331293 kubelet[1951]: E0515 10:39:20.331126 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" May 15 10:39:20.331293 kubelet[1951]: E0515 10:39:20.331189 1951 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2"} May 15 10:39:20.331293 kubelet[1951]: E0515 10:39:20.331241 1951 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ad701ce2-5ac1-471a-bae9-111eca92acb6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:20.331293 kubelet[1951]: E0515 10:39:20.331263 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ad701ce2-5ac1-471a-bae9-111eca92acb6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55d6dc944c-d6zgh" podUID="ad701ce2-5ac1-471a-bae9-111eca92acb6" May 15 10:39:20.333123 env[1217]: time="2025-05-15T10:39:20.333086691Z" level=error msg="StopPodSandbox for \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\" failed" error="failed to destroy network for sandbox \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:20.333353 kubelet[1951]: E0515 10:39:20.333305 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" May 15 10:39:20.333453 kubelet[1951]: E0515 10:39:20.333380 1951 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338"} May 15 10:39:20.333453 kubelet[1951]: E0515 10:39:20.333417 1951 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d27729e0-fe3d-4ead-899b-fa0ef12160ff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:20.333533 kubelet[1951]: E0515 10:39:20.333445 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d27729e0-fe3d-4ead-899b-fa0ef12160ff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-c6767cb7f-vt2wp" podUID="d27729e0-fe3d-4ead-899b-fa0ef12160ff" May 15 10:39:20.351363 env[1217]: time="2025-05-15T10:39:20.351300731Z" level=error msg="StopPodSandbox for \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\" failed" error="failed to destroy network for sandbox \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:20.351656 kubelet[1951]: E0515 10:39:20.351592 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" May 15 10:39:20.351731 kubelet[1951]: E0515 10:39:20.351674 1951 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e"} May 15 10:39:20.351731 kubelet[1951]: E0515 10:39:20.351714 1951 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"486bd89b-05b8-49ca-8103-b4cb3d3a867d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:20.351840 kubelet[1951]: E0515 10:39:20.351745 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"486bd89b-05b8-49ca-8103-b4cb3d3a867d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-c6767cb7f-5grml" podUID="486bd89b-05b8-49ca-8103-b4cb3d3a867d" May 15 10:39:20.355759 env[1217]: time="2025-05-15T10:39:20.355716933Z" level=error msg="StopPodSandbox for \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\" failed" error="failed to destroy network for sandbox \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:20.356177 kubelet[1951]: E0515 10:39:20.356049 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" May 15 10:39:20.356177 kubelet[1951]: E0515 10:39:20.356106 1951 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41"} May 15 10:39:20.356177 kubelet[1951]: E0515 10:39:20.356139 1951 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c26a27ad-f260-4d01-a93f-c6cf02296653\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:20.356445 kubelet[1951]: E0515 10:39:20.356359 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c26a27ad-f260-4d01-a93f-c6cf02296653\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-nknfx" podUID="c26a27ad-f260-4d01-a93f-c6cf02296653" May 15 10:39:20.371194 env[1217]: time="2025-05-15T10:39:20.371123926Z" level=error msg="StopPodSandbox for \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\" failed" error="failed to destroy network for sandbox \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:20.371456 kubelet[1951]: E0515 10:39:20.371409 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" May 15 10:39:20.371522 kubelet[1951]: E0515 10:39:20.371463 1951 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3"} May 15 10:39:20.371522 kubelet[1951]: E0515 10:39:20.371496 1951 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"78023a57-4294-4669-bd3b-842d5d20e076\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:20.371623 kubelet[1951]: E0515 10:39:20.371517 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"78023a57-4294-4669-bd3b-842d5d20e076\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-cjkpq" podUID="78023a57-4294-4669-bd3b-842d5d20e076" May 15 10:39:20.852980 systemd[1]: Created slice kubepods-besteffort-pod5de422bf_365e_4b7f_b2a7_451d003a44f6.slice. May 15 10:39:20.854978 env[1217]: time="2025-05-15T10:39:20.854925894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-b7nq8,Uid:5de422bf-365e-4b7f-b2a7-451d003a44f6,Namespace:calico-system,Attempt:0,}" May 15 10:39:20.923831 env[1217]: time="2025-05-15T10:39:20.923755763Z" level=error msg="Failed to destroy network for sandbox \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:20.924166 env[1217]: time="2025-05-15T10:39:20.924108686Z" level=error msg="encountered an error cleaning up failed sandbox \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:20.924229 env[1217]: time="2025-05-15T10:39:20.924176553Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-b7nq8,Uid:5de422bf-365e-4b7f-b2a7-451d003a44f6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:20.924487 kubelet[1951]: E0515 10:39:20.924428 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:20.924594 kubelet[1951]: E0515 10:39:20.924499 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-b7nq8" May 15 10:39:20.924594 kubelet[1951]: E0515 10:39:20.924524 1951 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-b7nq8" May 15 10:39:20.924694 kubelet[1951]: E0515 10:39:20.924583 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-b7nq8_calico-system(5de422bf-365e-4b7f-b2a7-451d003a44f6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-b7nq8_calico-system(5de422bf-365e-4b7f-b2a7-451d003a44f6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-b7nq8" podUID="5de422bf-365e-4b7f-b2a7-451d003a44f6" May 15 10:39:20.925856 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8-shm.mount: Deactivated successfully. May 15 10:39:21.285461 kubelet[1951]: I0515 10:39:21.285403 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" May 15 10:39:21.285989 env[1217]: time="2025-05-15T10:39:21.285950055Z" level=info msg="StopPodSandbox for \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\"" May 15 10:39:21.311639 env[1217]: time="2025-05-15T10:39:21.311569549Z" level=error msg="StopPodSandbox for \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\" failed" error="failed to destroy network for sandbox \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:21.311902 kubelet[1951]: E0515 10:39:21.311844 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" May 15 10:39:21.311959 kubelet[1951]: E0515 10:39:21.311917 1951 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8"} May 15 10:39:21.311990 kubelet[1951]: E0515 10:39:21.311958 1951 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5de422bf-365e-4b7f-b2a7-451d003a44f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:21.312059 kubelet[1951]: E0515 10:39:21.311985 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5de422bf-365e-4b7f-b2a7-451d003a44f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-b7nq8" podUID="5de422bf-365e-4b7f-b2a7-451d003a44f6" May 15 10:39:23.385860 systemd[1]: Started sshd@8-10.0.0.52:22-10.0.0.1:39146.service. May 15 10:39:23.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.52:22-10.0.0.1:39146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:23.626309 kernel: kauditd_printk_skb: 45 callbacks suppressed May 15 10:39:23.626486 kernel: audit: type=1130 audit(1747305563.385:1009): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.52:22-10.0.0.1:39146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:23.664000 audit[3076]: USER_ACCT pid=3076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:23.665914 sshd[3076]: Accepted publickey for core from 10.0.0.1 port 39146 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:23.669000 audit[3076]: CRED_ACQ pid=3076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:23.670734 sshd[3076]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:23.674217 kernel: audit: type=1101 audit(1747305563.664:1010): pid=3076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:23.674270 kernel: audit: type=1103 audit(1747305563.669:1011): pid=3076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:23.674290 kernel: audit: type=1006 audit(1747305563.669:1012): pid=3076 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 15 10:39:23.674697 systemd-logind[1201]: New session 9 of user core. May 15 10:39:23.675577 systemd[1]: Started session-9.scope. May 15 10:39:23.669000 audit[3076]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc3f29050 a2=3 a3=0 items=0 ppid=1 pid=3076 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:23.681194 kernel: audit: type=1300 audit(1747305563.669:1012): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc3f29050 a2=3 a3=0 items=0 ppid=1 pid=3076 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:23.681300 kernel: audit: type=1327 audit(1747305563.669:1012): proctitle=737368643A20636F7265205B707269765D May 15 10:39:23.669000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:23.679000 audit[3076]: USER_START pid=3076 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:23.687075 kernel: audit: type=1105 audit(1747305563.679:1013): pid=3076 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:23.687121 kernel: audit: type=1103 audit(1747305563.680:1014): pid=3078 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:23.680000 audit[3078]: CRED_ACQ pid=3078 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:23.793835 sshd[3076]: pam_unix(sshd:session): session closed for user core May 15 10:39:23.794000 audit[3076]: USER_END pid=3076 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:23.796690 systemd[1]: sshd@8-10.0.0.52:22-10.0.0.1:39146.service: Deactivated successfully. May 15 10:39:23.797707 systemd[1]: session-9.scope: Deactivated successfully. May 15 10:39:23.798419 systemd-logind[1201]: Session 9 logged out. Waiting for processes to exit. May 15 10:39:23.794000 audit[3076]: CRED_DISP pid=3076 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:23.799314 systemd-logind[1201]: Removed session 9. May 15 10:39:23.803186 kernel: audit: type=1106 audit(1747305563.794:1015): pid=3076 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:23.803248 kernel: audit: type=1104 audit(1747305563.794:1016): pid=3076 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:23.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.52:22-10.0.0.1:39146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:27.120564 kubelet[1951]: I0515 10:39:27.120505 1951 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:39:27.131245 kubelet[1951]: E0515 10:39:27.131207 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:27.424455 kubelet[1951]: E0515 10:39:27.424429 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:27.570000 audit[3092]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:27.570000 audit[3092]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcd183d7c0 a2=0 a3=7ffcd183d7ac items=0 ppid=2102 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:27.570000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:27.582000 audit[3092]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:27.582000 audit[3092]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffcd183d7c0 a2=0 a3=7ffcd183d7ac items=0 ppid=2102 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:27.582000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:27.592000 audit[3094]: NETFILTER_CFG table=filter:97 family=2 entries=17 op=nft_register_rule pid=3094 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:27.592000 audit[3094]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffda7a8d320 a2=0 a3=7ffda7a8d30c items=0 ppid=2102 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:27.592000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:27.597000 audit[3094]: NETFILTER_CFG table=nat:98 family=2 entries=19 op=nft_unregister_chain pid=3094 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:27.597000 audit[3094]: SYSCALL arch=c000003e syscall=46 success=yes exit=2956 a0=3 a1=7ffda7a8d320 a2=0 a3=0 items=0 ppid=2102 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:27.597000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:28.607000 audit[3096]: NETFILTER_CFG table=filter:99 family=2 entries=17 op=nft_register_rule pid=3096 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:28.609062 kernel: kauditd_printk_skb: 13 callbacks suppressed May 15 10:39:28.609222 kernel: audit: type=1325 audit(1747305568.607:1022): table=filter:99 family=2 entries=17 op=nft_register_rule pid=3096 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:28.607000 audit[3096]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffeeb56c340 a2=0 a3=7ffeeb56c32c items=0 ppid=2102 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:28.617231 kernel: audit: type=1300 audit(1747305568.607:1022): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffeeb56c340 a2=0 a3=7ffeeb56c32c items=0 ppid=2102 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:28.617450 kernel: audit: type=1327 audit(1747305568.607:1022): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:28.607000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:28.621000 audit[3096]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=3096 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:28.621000 audit[3096]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffeeb56c340 a2=0 a3=7ffeeb56c32c items=0 ppid=2102 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:28.632646 kernel: audit: type=1325 audit(1747305568.621:1023): table=nat:100 family=2 entries=19 op=nft_register_chain pid=3096 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:28.632736 kernel: audit: type=1300 audit(1747305568.621:1023): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffeeb56c340 a2=0 a3=7ffeeb56c32c items=0 ppid=2102 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:28.632762 kernel: audit: type=1327 audit(1747305568.621:1023): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:28.621000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:28.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.52:22-10.0.0.1:43532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:28.798645 systemd[1]: Started sshd@9-10.0.0.52:22-10.0.0.1:43532.service. May 15 10:39:28.803402 kernel: audit: type=1130 audit(1747305568.798:1024): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.52:22-10.0.0.1:43532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:28.841000 audit[3098]: USER_ACCT pid=3098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:28.841791 sshd[3098]: Accepted publickey for core from 10.0.0.1 port 43532 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:28.851210 kernel: audit: type=1101 audit(1747305568.841:1025): pid=3098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:28.851290 kernel: audit: type=1103 audit(1747305568.845:1026): pid=3098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:28.845000 audit[3098]: CRED_ACQ pid=3098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:28.846556 sshd[3098]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:28.853199 systemd[1]: Started session-10.scope. May 15 10:39:28.853873 systemd-logind[1201]: New session 10 of user core. May 15 10:39:28.845000 audit[3098]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe337f55a0 a2=3 a3=0 items=0 ppid=1 pid=3098 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:28.845000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:28.855420 kernel: audit: type=1006 audit(1747305568.845:1027): pid=3098 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 15 10:39:28.859000 audit[3098]: USER_START pid=3098 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:28.861000 audit[3100]: CRED_ACQ pid=3100 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:28.993265 sshd[3098]: pam_unix(sshd:session): session closed for user core May 15 10:39:28.993000 audit[3098]: USER_END pid=3098 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:28.994000 audit[3098]: CRED_DISP pid=3098 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:28.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.52:22-10.0.0.1:43532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:28.995761 systemd[1]: sshd@9-10.0.0.52:22-10.0.0.1:43532.service: Deactivated successfully. May 15 10:39:28.996447 systemd[1]: session-10.scope: Deactivated successfully. May 15 10:39:28.997528 systemd-logind[1201]: Session 10 logged out. Waiting for processes to exit. May 15 10:39:28.998209 systemd-logind[1201]: Removed session 10. May 15 10:39:29.005705 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2586305995.mount: Deactivated successfully. May 15 10:39:31.678671 env[1217]: time="2025-05-15T10:39:31.678608294Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:31.682523 env[1217]: time="2025-05-15T10:39:31.682460127Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:31.685091 env[1217]: time="2025-05-15T10:39:31.685046152Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:31.687066 env[1217]: time="2025-05-15T10:39:31.687019047Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:31.687384 env[1217]: time="2025-05-15T10:39:31.687335201Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 10:39:31.693138 env[1217]: time="2025-05-15T10:39:31.693108372Z" level=info msg="CreateContainer within sandbox \"b956419c2dc3c52ef6db5c00919af0cb8a4828f2b6fff2f0f0540541375b14cc\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 10:39:31.715068 env[1217]: time="2025-05-15T10:39:31.715003515Z" level=info msg="CreateContainer within sandbox \"b956419c2dc3c52ef6db5c00919af0cb8a4828f2b6fff2f0f0540541375b14cc\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1bc1552ba9f93fe8a74b4fcb02799ac69e4a974a25b11cbf90ac4750441a3646\"" May 15 10:39:31.715741 env[1217]: time="2025-05-15T10:39:31.715710242Z" level=info msg="StartContainer for \"1bc1552ba9f93fe8a74b4fcb02799ac69e4a974a25b11cbf90ac4750441a3646\"" May 15 10:39:31.735112 systemd[1]: Started cri-containerd-1bc1552ba9f93fe8a74b4fcb02799ac69e4a974a25b11cbf90ac4750441a3646.scope. May 15 10:39:31.750000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f64ef0acd58 items=0 ppid=2443 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:31.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162633135353262613966393366653861373462346663623032373939 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit: BPF prog-id=136 op=LOAD May 15 10:39:31.750000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002f3c58 items=0 ppid=2443 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:31.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162633135353262613966393366653861373462346663623032373939 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit: BPF prog-id=137 op=LOAD May 15 10:39:31.750000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002f3ca8 items=0 ppid=2443 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:31.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162633135353262613966393366653861373462346663623032373939 May 15 10:39:31.750000 audit: BPF prog-id=137 op=UNLOAD May 15 10:39:31.750000 audit: BPF prog-id=136 op=UNLOAD May 15 10:39:31.750000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:31.750000 audit: BPF prog-id=138 op=LOAD May 15 10:39:31.750000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002f3d38 items=0 ppid=2443 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:31.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162633135353262613966393366653861373462346663623032373939 May 15 10:39:31.765563 env[1217]: time="2025-05-15T10:39:31.765516335Z" level=info msg="StartContainer for \"1bc1552ba9f93fe8a74b4fcb02799ac69e4a974a25b11cbf90ac4750441a3646\" returns successfully" May 15 10:39:31.848488 env[1217]: time="2025-05-15T10:39:31.848431108Z" level=info msg="StopPodSandbox for \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\"" May 15 10:39:31.865002 env[1217]: time="2025-05-15T10:39:31.848888917Z" level=info msg="StopPodSandbox for \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\"" May 15 10:39:31.865002 env[1217]: time="2025-05-15T10:39:31.849245026Z" level=info msg="StopPodSandbox for \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\"" May 15 10:39:31.901924 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 10:39:31.902122 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 10:39:31.904490 env[1217]: time="2025-05-15T10:39:31.904415622Z" level=error msg="StopPodSandbox for \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\" failed" error="failed to destroy network for sandbox \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:31.904697 kubelet[1951]: E0515 10:39:31.904651 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" May 15 10:39:31.905058 kubelet[1951]: E0515 10:39:31.904717 1951 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3"} May 15 10:39:31.905058 kubelet[1951]: E0515 10:39:31.904767 1951 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"78023a57-4294-4669-bd3b-842d5d20e076\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:31.905058 kubelet[1951]: E0515 10:39:31.904795 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"78023a57-4294-4669-bd3b-842d5d20e076\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-cjkpq" podUID="78023a57-4294-4669-bd3b-842d5d20e076" May 15 10:39:31.906404 env[1217]: time="2025-05-15T10:39:31.906354272Z" level=error msg="StopPodSandbox for \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\" failed" error="failed to destroy network for sandbox \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:31.906635 kubelet[1951]: E0515 10:39:31.906600 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" May 15 10:39:31.906719 kubelet[1951]: E0515 10:39:31.906639 1951 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2"} May 15 10:39:31.906719 kubelet[1951]: E0515 10:39:31.906660 1951 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ad701ce2-5ac1-471a-bae9-111eca92acb6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:31.906719 kubelet[1951]: E0515 10:39:31.906676 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ad701ce2-5ac1-471a-bae9-111eca92acb6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55d6dc944c-d6zgh" podUID="ad701ce2-5ac1-471a-bae9-111eca92acb6" May 15 10:39:31.909842 env[1217]: time="2025-05-15T10:39:31.909808308Z" level=error msg="StopPodSandbox for \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\" failed" error="failed to destroy network for sandbox \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:31.910096 kubelet[1951]: E0515 10:39:31.910032 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" May 15 10:39:31.910096 kubelet[1951]: E0515 10:39:31.910072 1951 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338"} May 15 10:39:31.910227 kubelet[1951]: E0515 10:39:31.910108 1951 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d27729e0-fe3d-4ead-899b-fa0ef12160ff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:31.910227 kubelet[1951]: E0515 10:39:31.910135 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d27729e0-fe3d-4ead-899b-fa0ef12160ff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-c6767cb7f-vt2wp" podUID="d27729e0-fe3d-4ead-899b-fa0ef12160ff" May 15 10:39:32.435278 kubelet[1951]: E0515 10:39:32.434991 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:32.468772 kubelet[1951]: I0515 10:39:32.468694 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-fcvxt" podStartSLOduration=1.453071797 podStartE2EDuration="29.468673222s" podCreationTimestamp="2025-05-15 10:39:03 +0000 UTC" firstStartedPulling="2025-05-15 10:39:03.672542264 +0000 UTC m=+13.902020082" lastFinishedPulling="2025-05-15 10:39:31.688143689 +0000 UTC m=+41.917621507" observedRunningTime="2025-05-15 10:39:32.46803278 +0000 UTC m=+42.697510628" watchObservedRunningTime="2025-05-15 10:39:32.468673222 +0000 UTC m=+42.698151040" May 15 10:39:33.118000 audit[3313]: AVC avc: denied { write } for pid=3313 comm="tee" name="fd" dev="proc" ino=25202 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:33.118000 audit[3313]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff2a94da30 a2=241 a3=1b6 items=1 ppid=3291 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.118000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 10:39:33.118000 audit: PATH item=0 name="/dev/fd/63" inode=25862 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:33.118000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:33.130000 audit[3339]: AVC avc: denied { write } for pid=3339 comm="tee" name="fd" dev="proc" ino=25879 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:33.130000 audit[3339]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd61732a2e a2=241 a3=1b6 items=1 ppid=3293 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.130000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 10:39:33.130000 audit: PATH item=0 name="/dev/fd/63" inode=25870 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:33.130000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:33.131000 audit[3342]: AVC avc: denied { write } for pid=3342 comm="tee" name="fd" dev="proc" ino=25883 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:33.131000 audit[3342]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff606dea1f a2=241 a3=1b6 items=1 ppid=3299 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.131000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 10:39:33.131000 audit: PATH item=0 name="/dev/fd/63" inode=24115 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:33.131000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:33.146000 audit[3357]: AVC avc: denied { write } for pid=3357 comm="tee" name="fd" dev="proc" ino=24120 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:33.146000 audit[3357]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd81418a1e a2=241 a3=1b6 items=1 ppid=3288 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.146000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 10:39:33.146000 audit: PATH item=0 name="/dev/fd/63" inode=25887 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:33.146000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:33.152000 audit[3365]: AVC avc: denied { write } for pid=3365 comm="tee" name="fd" dev="proc" ino=24133 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:33.152000 audit[3365]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc260b2a2e a2=241 a3=1b6 items=1 ppid=3287 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.152000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 10:39:33.152000 audit: PATH item=0 name="/dev/fd/63" inode=24127 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:33.152000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:33.168000 audit[3367]: AVC avc: denied { write } for pid=3367 comm="tee" name="fd" dev="proc" ino=23408 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:33.168000 audit[3367]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff7ef43a2f a2=241 a3=1b6 items=1 ppid=3286 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.168000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 10:39:33.168000 audit: PATH item=0 name="/dev/fd/63" inode=24130 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:33.168000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:33.173000 audit[3363]: AVC avc: denied { write } for pid=3363 comm="tee" name="fd" dev="proc" ino=25903 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:33.173000 audit[3363]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe4da9ba2e a2=241 a3=1b6 items=1 ppid=3295 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.173000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 10:39:33.173000 audit: PATH item=0 name="/dev/fd/63" inode=24124 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:33.173000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit: BPF prog-id=139 op=LOAD May 15 10:39:33.226000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd08190f10 a2=98 a3=3 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.226000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.226000 audit: BPF prog-id=139 op=UNLOAD May 15 10:39:33.226000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit: BPF prog-id=140 op=LOAD May 15 10:39:33.226000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd08190cf0 a2=74 a3=540051 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.226000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.226000 audit: BPF prog-id=140 op=UNLOAD May 15 10:39:33.226000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.226000 audit: BPF prog-id=141 op=LOAD May 15 10:39:33.226000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd08190d20 a2=94 a3=2 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.226000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.226000 audit: BPF prog-id=141 op=UNLOAD May 15 10:39:33.338000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.338000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.338000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.338000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.338000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.338000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.338000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.338000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.338000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.338000 audit: BPF prog-id=142 op=LOAD May 15 10:39:33.338000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd08190be0 a2=40 a3=1 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.338000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.338000 audit: BPF prog-id=142 op=UNLOAD May 15 10:39:33.338000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.338000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd08190cb0 a2=50 a3=7ffd08190d90 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.338000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.345000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.345000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd08190bf0 a2=28 a3=0 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.345000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.345000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd08190c20 a2=28 a3=0 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.345000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.345000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd08190b30 a2=28 a3=0 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.345000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.345000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd08190c40 a2=28 a3=0 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.345000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.345000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd08190c20 a2=28 a3=0 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.345000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.345000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd08190c10 a2=28 a3=0 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.345000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.345000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd08190c40 a2=28 a3=0 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.345000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.345000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd08190c20 a2=28 a3=0 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.345000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.345000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd08190c40 a2=28 a3=0 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.345000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.345000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd08190c10 a2=28 a3=0 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd08190c80 a2=28 a3=0 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.346000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd08190a30 a2=50 a3=1 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.346000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit: BPF prog-id=143 op=LOAD May 15 10:39:33.346000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd08190a30 a2=94 a3=5 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.346000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.346000 audit: BPF prog-id=143 op=UNLOAD May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd08190ae0 a2=50 a3=1 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.346000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd08190c00 a2=4 a3=38 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.346000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:33.346000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd08190c50 a2=94 a3=6 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.346000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:33.346000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd08190400 a2=94 a3=83 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.346000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { perfmon } for pid=3385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { bpf } for pid=3385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.346000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:33.346000 audit[3385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd08190400 a2=94 a3=83 items=0 ppid=3297 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.346000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:33.353000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit: BPF prog-id=144 op=LOAD May 15 10:39:33.353000 audit[3408]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc3c293710 a2=98 a3=1999999999999999 items=0 ppid=3297 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.353000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:39:33.353000 audit: BPF prog-id=144 op=UNLOAD May 15 10:39:33.353000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit: BPF prog-id=145 op=LOAD May 15 10:39:33.353000 audit[3408]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc3c2935f0 a2=74 a3=ffff items=0 ppid=3297 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.353000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:39:33.353000 audit: BPF prog-id=145 op=UNLOAD May 15 10:39:33.353000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.353000 audit: BPF prog-id=146 op=LOAD May 15 10:39:33.353000 audit[3408]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc3c293630 a2=40 a3=7ffc3c293810 items=0 ppid=3297 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.353000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:39:33.353000 audit: BPF prog-id=146 op=UNLOAD May 15 10:39:33.389001 systemd-networkd[1039]: vxlan.calico: Link UP May 15 10:39:33.389009 systemd-networkd[1039]: vxlan.calico: Gained carrier May 15 10:39:33.402000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit: BPF prog-id=147 op=LOAD May 15 10:39:33.402000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc3d00a130 a2=98 a3=ffffffff items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.402000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.402000 audit: BPF prog-id=147 op=UNLOAD May 15 10:39:33.402000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit: BPF prog-id=148 op=LOAD May 15 10:39:33.402000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc3d009f40 a2=74 a3=540051 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.402000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.402000 audit: BPF prog-id=148 op=UNLOAD May 15 10:39:33.402000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.402000 audit: BPF prog-id=149 op=LOAD May 15 10:39:33.402000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc3d009f70 a2=94 a3=2 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.402000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.403000 audit: BPF prog-id=149 op=UNLOAD May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc3d009e40 a2=28 a3=0 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3d009e70 a2=28 a3=0 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3d009d80 a2=28 a3=0 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc3d009e90 a2=28 a3=0 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc3d009e70 a2=28 a3=0 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc3d009e60 a2=28 a3=0 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc3d009e90 a2=28 a3=0 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3d009e70 a2=28 a3=0 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3d009e90 a2=28 a3=0 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3d009e60 a2=28 a3=0 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc3d009ed0 a2=28 a3=0 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit: BPF prog-id=150 op=LOAD May 15 10:39:33.403000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc3d009d40 a2=40 a3=0 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.403000 audit: BPF prog-id=150 op=UNLOAD May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc3d009d30 a2=50 a3=2800 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc3d009d30 a2=50 a3=2800 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit: BPF prog-id=151 op=LOAD May 15 10:39:33.403000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc3d009550 a2=94 a3=2 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.403000 audit: BPF prog-id=151 op=UNLOAD May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.403000 audit: BPF prog-id=152 op=LOAD May 15 10:39:33.403000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc3d009650 a2=94 a3=30 items=0 ppid=3297 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:33.407000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.407000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.407000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.407000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.407000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.407000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.407000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.407000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.407000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.407000 audit: BPF prog-id=153 op=LOAD May 15 10:39:33.407000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe4bc11060 a2=98 a3=0 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.407000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.408000 audit: BPF prog-id=153 op=UNLOAD May 15 10:39:33.408000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit: BPF prog-id=154 op=LOAD May 15 10:39:33.408000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe4bc10e40 a2=74 a3=540051 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.408000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.408000 audit: BPF prog-id=154 op=UNLOAD May 15 10:39:33.408000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.408000 audit: BPF prog-id=155 op=LOAD May 15 10:39:33.408000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe4bc10e70 a2=94 a3=2 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.408000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.408000 audit: BPF prog-id=155 op=UNLOAD May 15 10:39:33.436352 kubelet[1951]: E0515 10:39:33.436306 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:33.452651 systemd[1]: run-containerd-runc-k8s.io-1bc1552ba9f93fe8a74b4fcb02799ac69e4a974a25b11cbf90ac4750441a3646-runc.IjI9GN.mount: Deactivated successfully. May 15 10:39:33.531000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.531000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.531000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.531000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.531000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.531000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.531000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.531000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.531000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.531000 audit: BPF prog-id=156 op=LOAD May 15 10:39:33.531000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe4bc10d30 a2=40 a3=1 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.531000 audit: BPF prog-id=156 op=UNLOAD May 15 10:39:33.531000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.531000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe4bc10e00 a2=50 a3=7ffe4bc10ee0 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.538000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.538000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4bc10d40 a2=28 a3=0 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.538000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.538000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4bc10d70 a2=28 a3=0 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.538000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.538000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4bc10c80 a2=28 a3=0 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.538000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.538000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4bc10d90 a2=28 a3=0 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.538000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.538000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4bc10d70 a2=28 a3=0 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.538000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.538000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4bc10d60 a2=28 a3=0 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.538000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.538000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4bc10d90 a2=28 a3=0 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.538000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.538000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4bc10d70 a2=28 a3=0 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.538000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.538000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4bc10d90 a2=28 a3=0 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.538000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.538000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4bc10d60 a2=28 a3=0 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.538000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.538000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4bc10dd0 a2=28 a3=0 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.538000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.538000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe4bc10b80 a2=50 a3=1 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit: BPF prog-id=157 op=LOAD May 15 10:39:33.539000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe4bc10b80 a2=94 a3=5 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.539000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.539000 audit: BPF prog-id=157 op=UNLOAD May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe4bc10c30 a2=50 a3=1 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.539000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe4bc10d50 a2=4 a3=38 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.539000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { confidentiality } for pid=3442 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:33.539000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe4bc10da0 a2=94 a3=6 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.539000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { confidentiality } for pid=3442 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:33.539000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe4bc10550 a2=94 a3=83 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.539000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { perfmon } for pid=3442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { confidentiality } for pid=3442 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:33.539000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe4bc10550 a2=94 a3=83 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.539000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.539000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.539000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4bc11f90 a2=10 a3=208 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.539000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.540000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.540000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4bc11e30 a2=10 a3=3 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.540000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.540000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.540000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4bc11dd0 a2=10 a3=3 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.540000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.540000 audit[3442]: AVC avc: denied { bpf } for pid=3442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:33.540000 audit[3442]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4bc11dd0 a2=10 a3=7 items=0 ppid=3297 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.540000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:33.547000 audit: BPF prog-id=152 op=UNLOAD May 15 10:39:33.586000 audit[3489]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=3489 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:33.586000 audit[3489]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd0ac88590 a2=0 a3=7ffd0ac8857c items=0 ppid=3297 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.586000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:33.591000 audit[3491]: NETFILTER_CFG table=nat:102 family=2 entries=15 op=nft_register_chain pid=3491 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:33.591000 audit[3491]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffcc6419330 a2=0 a3=7ffcc641931c items=0 ppid=3297 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.591000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:33.595000 audit[3494]: NETFILTER_CFG table=filter:103 family=2 entries=39 op=nft_register_chain pid=3494 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:33.595000 audit[3494]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffded2145d0 a2=0 a3=7ffded2145bc items=0 ppid=3297 pid=3494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.595000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:33.597000 audit[3490]: NETFILTER_CFG table=raw:104 family=2 entries=21 op=nft_register_chain pid=3490 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:33.597000 audit[3490]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffdc1bd0b10 a2=0 a3=7ffdc1bd0afc items=0 ppid=3297 pid=3490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:33.597000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:33.848660 env[1217]: time="2025-05-15T10:39:33.848610771Z" level=info msg="StopPodSandbox for \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\"" May 15 10:39:33.967701 env[1217]: 2025-05-15 10:39:33.909 [INFO][3514] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" May 15 10:39:33.967701 env[1217]: 2025-05-15 10:39:33.909 [INFO][3514] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" iface="eth0" netns="/var/run/netns/cni-aad6b929-4b50-7304-584a-b1c8ff751a37" May 15 10:39:33.967701 env[1217]: 2025-05-15 10:39:33.909 [INFO][3514] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" iface="eth0" netns="/var/run/netns/cni-aad6b929-4b50-7304-584a-b1c8ff751a37" May 15 10:39:33.967701 env[1217]: 2025-05-15 10:39:33.910 [INFO][3514] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" iface="eth0" netns="/var/run/netns/cni-aad6b929-4b50-7304-584a-b1c8ff751a37" May 15 10:39:33.967701 env[1217]: 2025-05-15 10:39:33.910 [INFO][3514] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" May 15 10:39:33.967701 env[1217]: 2025-05-15 10:39:33.910 [INFO][3514] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" May 15 10:39:33.967701 env[1217]: 2025-05-15 10:39:33.955 [INFO][3523] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" HandleID="k8s-pod-network.90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" Workload="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" May 15 10:39:33.967701 env[1217]: 2025-05-15 10:39:33.956 [INFO][3523] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:33.967701 env[1217]: 2025-05-15 10:39:33.956 [INFO][3523] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:33.967701 env[1217]: 2025-05-15 10:39:33.962 [WARNING][3523] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" HandleID="k8s-pod-network.90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" Workload="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" May 15 10:39:33.967701 env[1217]: 2025-05-15 10:39:33.963 [INFO][3523] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" HandleID="k8s-pod-network.90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" Workload="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" May 15 10:39:33.967701 env[1217]: 2025-05-15 10:39:33.964 [INFO][3523] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:33.967701 env[1217]: 2025-05-15 10:39:33.966 [INFO][3514] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" May 15 10:39:33.968154 env[1217]: time="2025-05-15T10:39:33.967836036Z" level=info msg="TearDown network for sandbox \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\" successfully" May 15 10:39:33.968154 env[1217]: time="2025-05-15T10:39:33.967867004Z" level=info msg="StopPodSandbox for \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\" returns successfully" May 15 10:39:33.968235 kubelet[1951]: E0515 10:39:33.968212 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:33.969496 env[1217]: time="2025-05-15T10:39:33.969464884Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-nknfx,Uid:c26a27ad-f260-4d01-a93f-c6cf02296653,Namespace:kube-system,Attempt:1,}" May 15 10:39:33.969874 systemd[1]: run-netns-cni\x2daad6b929\x2d4b50\x2d7304\x2d584a\x2db1c8ff751a37.mount: Deactivated successfully. May 15 10:39:33.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.52:22-10.0.0.1:41396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:33.998836 systemd[1]: Started sshd@10-10.0.0.52:22-10.0.0.1:41396.service. May 15 10:39:33.999893 kernel: kauditd_printk_skb: 565 callbacks suppressed May 15 10:39:34.000053 kernel: audit: type=1130 audit(1747305573.998:1141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.52:22-10.0.0.1:41396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:34.039000 audit[3543]: USER_ACCT pid=3543 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.054832 kernel: audit: type=1101 audit(1747305574.039:1142): pid=3543 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.054876 kernel: audit: type=1103 audit(1747305574.043:1143): pid=3543 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.054896 kernel: audit: type=1006 audit(1747305574.043:1144): pid=3543 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 15 10:39:34.054911 kernel: audit: type=1300 audit(1747305574.043:1144): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff057210f0 a2=3 a3=0 items=0 ppid=1 pid=3543 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.054928 kernel: audit: type=1327 audit(1747305574.043:1144): proctitle=737368643A20636F7265205B707269765D May 15 10:39:34.043000 audit[3543]: CRED_ACQ pid=3543 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.043000 audit[3543]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff057210f0 a2=3 a3=0 items=0 ppid=1 pid=3543 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.043000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:34.055094 sshd[3543]: Accepted publickey for core from 10.0.0.1 port 41396 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:34.044178 sshd[3543]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:34.049070 systemd[1]: Started session-11.scope. May 15 10:39:34.049524 systemd-logind[1201]: New session 11 of user core. May 15 10:39:34.054000 audit[3543]: USER_START pid=3543 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.055000 audit[3556]: CRED_ACQ pid=3556 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.064122 kernel: audit: type=1105 audit(1747305574.054:1145): pid=3543 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.064198 kernel: audit: type=1103 audit(1747305574.055:1146): pid=3556 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.088859 systemd-networkd[1039]: cali2edb58d86d2: Link UP May 15 10:39:34.090414 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2edb58d86d2: link becomes ready May 15 10:39:34.091910 systemd-networkd[1039]: cali2edb58d86d2: Gained carrier May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.027 [INFO][3530] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--nknfx-eth0 coredns-668d6bf9bc- kube-system c26a27ad-f260-4d01-a93f-c6cf02296653 925 0 2025-05-15 10:38:55 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-nknfx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2edb58d86d2 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" Namespace="kube-system" Pod="coredns-668d6bf9bc-nknfx" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--nknfx-" May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.027 [INFO][3530] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" Namespace="kube-system" Pod="coredns-668d6bf9bc-nknfx" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.052 [INFO][3548] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" HandleID="k8s-pod-network.65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" Workload="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.059 [INFO][3548] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" HandleID="k8s-pod-network.65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" Workload="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f5820), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-nknfx", "timestamp":"2025-05-15 10:39:34.051990079 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.059 [INFO][3548] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.059 [INFO][3548] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.059 [INFO][3548] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.061 [INFO][3548] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" host="localhost" May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.068 [INFO][3548] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.071 [INFO][3548] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.072 [INFO][3548] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.074 [INFO][3548] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.074 [INFO][3548] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" host="localhost" May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.075 [INFO][3548] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751 May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.079 [INFO][3548] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" host="localhost" May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.083 [INFO][3548] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" host="localhost" May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.083 [INFO][3548] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" host="localhost" May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.083 [INFO][3548] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:34.111010 env[1217]: 2025-05-15 10:39:34.083 [INFO][3548] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" HandleID="k8s-pod-network.65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" Workload="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" May 15 10:39:34.111882 env[1217]: 2025-05-15 10:39:34.086 [INFO][3530] cni-plugin/k8s.go 386: Populated endpoint ContainerID="65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" Namespace="kube-system" Pod="coredns-668d6bf9bc-nknfx" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--nknfx-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"c26a27ad-f260-4d01-a93f-c6cf02296653", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-nknfx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2edb58d86d2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:34.111882 env[1217]: 2025-05-15 10:39:34.087 [INFO][3530] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" Namespace="kube-system" Pod="coredns-668d6bf9bc-nknfx" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" May 15 10:39:34.111882 env[1217]: 2025-05-15 10:39:34.087 [INFO][3530] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2edb58d86d2 ContainerID="65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" Namespace="kube-system" Pod="coredns-668d6bf9bc-nknfx" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" May 15 10:39:34.111882 env[1217]: 2025-05-15 10:39:34.090 [INFO][3530] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" Namespace="kube-system" Pod="coredns-668d6bf9bc-nknfx" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" May 15 10:39:34.111882 env[1217]: 2025-05-15 10:39:34.090 [INFO][3530] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" Namespace="kube-system" Pod="coredns-668d6bf9bc-nknfx" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--nknfx-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"c26a27ad-f260-4d01-a93f-c6cf02296653", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751", Pod:"coredns-668d6bf9bc-nknfx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2edb58d86d2", MAC:"d6:74:39:45:e0:02", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:34.111882 env[1217]: 2025-05-15 10:39:34.103 [INFO][3530] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751" Namespace="kube-system" Pod="coredns-668d6bf9bc-nknfx" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" May 15 10:39:34.124000 audit[3576]: NETFILTER_CFG table=filter:105 family=2 entries=34 op=nft_register_chain pid=3576 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:34.124000 audit[3576]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffdc6f15e80 a2=0 a3=7ffdc6f15e6c items=0 ppid=3297 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.132969 kernel: audit: type=1325 audit(1747305574.124:1147): table=filter:105 family=2 entries=34 op=nft_register_chain pid=3576 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:34.133102 kernel: audit: type=1300 audit(1747305574.124:1147): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffdc6f15e80 a2=0 a3=7ffdc6f15e6c items=0 ppid=3297 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.124000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:34.139016 env[1217]: time="2025-05-15T10:39:34.138938013Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:34.139016 env[1217]: time="2025-05-15T10:39:34.138980443Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:34.139016 env[1217]: time="2025-05-15T10:39:34.138990373Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:34.139453 env[1217]: time="2025-05-15T10:39:34.139338997Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751 pid=3588 runtime=io.containerd.runc.v2 May 15 10:39:34.154869 systemd[1]: Started cri-containerd-65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751.scope. May 15 10:39:34.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.167000 audit: BPF prog-id=158 op=LOAD May 15 10:39:34.168000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.168000 audit[3599]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3588 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616230656636393133353566303931396130336235333830613430 May 15 10:39:34.168000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.168000 audit[3599]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3588 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616230656636393133353566303931396130336235333830613430 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit: BPF prog-id=159 op=LOAD May 15 10:39:34.169000 audit[3599]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c63a0 items=0 ppid=3588 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616230656636393133353566303931396130336235333830613430 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit: BPF prog-id=160 op=LOAD May 15 10:39:34.169000 audit[3599]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c63e8 items=0 ppid=3588 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616230656636393133353566303931396130336235333830613430 May 15 10:39:34.169000 audit: BPF prog-id=160 op=UNLOAD May 15 10:39:34.169000 audit: BPF prog-id=159 op=UNLOAD May 15 10:39:34.169000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.169000 audit: BPF prog-id=161 op=LOAD May 15 10:39:34.169000 audit[3599]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c67f8 items=0 ppid=3588 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616230656636393133353566303931396130336235333830613430 May 15 10:39:34.170757 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:39:34.193089 env[1217]: time="2025-05-15T10:39:34.193039794Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-nknfx,Uid:c26a27ad-f260-4d01-a93f-c6cf02296653,Namespace:kube-system,Attempt:1,} returns sandbox id \"65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751\"" May 15 10:39:34.193916 kubelet[1951]: E0515 10:39:34.193726 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:34.195633 env[1217]: time="2025-05-15T10:39:34.195584611Z" level=info msg="CreateContainer within sandbox \"65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:39:34.214711 env[1217]: time="2025-05-15T10:39:34.214669511Z" level=info msg="CreateContainer within sandbox \"65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"fe84d9ab2ee4c2ca9f5a8a6f7e2497edfda347d2cc8782f2d3343a750e63e450\"" May 15 10:39:34.215255 env[1217]: time="2025-05-15T10:39:34.215222409Z" level=info msg="StartContainer for \"fe84d9ab2ee4c2ca9f5a8a6f7e2497edfda347d2cc8782f2d3343a750e63e450\"" May 15 10:39:34.222830 sshd[3543]: pam_unix(sshd:session): session closed for user core May 15 10:39:34.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.52:22-10.0.0.1:41398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:34.226732 systemd[1]: Started sshd@11-10.0.0.52:22-10.0.0.1:41398.service. May 15 10:39:34.229000 audit[3543]: USER_END pid=3543 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.229000 audit[3543]: CRED_DISP pid=3543 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.52:22-10.0.0.1:41396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:34.232031 systemd[1]: sshd@10-10.0.0.52:22-10.0.0.1:41396.service: Deactivated successfully. May 15 10:39:34.232769 systemd[1]: session-11.scope: Deactivated successfully. May 15 10:39:34.233473 systemd-logind[1201]: Session 11 logged out. Waiting for processes to exit. May 15 10:39:34.234125 systemd-logind[1201]: Removed session 11. May 15 10:39:34.237128 systemd[1]: Started cri-containerd-fe84d9ab2ee4c2ca9f5a8a6f7e2497edfda347d2cc8782f2d3343a750e63e450.scope. May 15 10:39:34.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit: BPF prog-id=162 op=LOAD May 15 10:39:34.249000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3588 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665383464396162326565346332636139663561386136663765323439 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3588 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665383464396162326565346332636139663561386136663765323439 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit: BPF prog-id=163 op=LOAD May 15 10:39:34.249000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000187fa0 items=0 ppid=3588 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665383464396162326565346332636139663561386136663765323439 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.249000 audit: BPF prog-id=164 op=LOAD May 15 10:39:34.249000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000187fe8 items=0 ppid=3588 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665383464396162326565346332636139663561386136663765323439 May 15 10:39:34.250000 audit: BPF prog-id=164 op=UNLOAD May 15 10:39:34.250000 audit: BPF prog-id=163 op=UNLOAD May 15 10:39:34.250000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.250000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.250000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.250000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.250000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.250000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.250000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.250000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.250000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.250000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:34.250000 audit: BPF prog-id=165 op=LOAD May 15 10:39:34.250000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c23f8 items=0 ppid=3588 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665383464396162326565346332636139663561386136663765323439 May 15 10:39:34.264510 env[1217]: time="2025-05-15T10:39:34.264472450Z" level=info msg="StartContainer for \"fe84d9ab2ee4c2ca9f5a8a6f7e2497edfda347d2cc8782f2d3343a750e63e450\" returns successfully" May 15 10:39:34.264000 audit[3639]: USER_ACCT pid=3639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.264893 sshd[3639]: Accepted publickey for core from 10.0.0.1 port 41398 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:34.265000 audit[3639]: CRED_ACQ pid=3639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.265000 audit[3639]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7e5a6040 a2=3 a3=0 items=0 ppid=1 pid=3639 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.265000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:34.266279 sshd[3639]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:34.270316 systemd-logind[1201]: New session 12 of user core. May 15 10:39:34.271049 systemd[1]: Started session-12.scope. May 15 10:39:34.274000 audit[3639]: USER_START pid=3639 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.276000 audit[3656]: CRED_ACQ pid=3656 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.428929 sshd[3639]: pam_unix(sshd:session): session closed for user core May 15 10:39:34.430000 audit[3639]: USER_END pid=3639 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.430000 audit[3639]: CRED_DISP pid=3639 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.430000 audit[3643]: AVC avc: denied { getattr } for pid=3643 comm="coredns" path="cgroup:[4026532525]" dev="nsfs" ino=4026532525 scontext=system_u:system_r:svirt_lxc_net_t:s0:c155,c303 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 15 10:39:34.430000 audit[3643]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c0000db078 a3=0 items=0 ppid=3588 pid=3643 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c155,c303 key=(null) May 15 10:39:34.430000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 15 10:39:34.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.52:22-10.0.0.1:41408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:34.431530 systemd[1]: Started sshd@12-10.0.0.52:22-10.0.0.1:41408.service. May 15 10:39:34.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.52:22-10.0.0.1:41398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:34.432468 systemd[1]: sshd@11-10.0.0.52:22-10.0.0.1:41398.service: Deactivated successfully. May 15 10:39:34.433416 systemd[1]: session-12.scope: Deactivated successfully. May 15 10:39:34.434083 systemd-logind[1201]: Session 12 logged out. Waiting for processes to exit. May 15 10:39:34.435196 systemd-logind[1201]: Removed session 12. May 15 10:39:34.440905 kubelet[1951]: E0515 10:39:34.440868 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:34.456084 kubelet[1951]: I0515 10:39:34.456022 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-nknfx" podStartSLOduration=39.456002666 podStartE2EDuration="39.456002666s" podCreationTimestamp="2025-05-15 10:38:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:39:34.454920094 +0000 UTC m=+44.684397922" watchObservedRunningTime="2025-05-15 10:39:34.456002666 +0000 UTC m=+44.685480474" May 15 10:39:34.467000 audit[3675]: NETFILTER_CFG table=filter:106 family=2 entries=16 op=nft_register_rule pid=3675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:34.467000 audit[3675]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdd54b9e00 a2=0 a3=7ffdd54b9dec items=0 ppid=2102 pid=3675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.467000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:34.472000 audit[3675]: NETFILTER_CFG table=nat:107 family=2 entries=14 op=nft_register_rule pid=3675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:34.472000 audit[3675]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffdd54b9e00 a2=0 a3=0 items=0 ppid=2102 pid=3675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:34.480000 audit[3669]: USER_ACCT pid=3669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.480756 sshd[3669]: Accepted publickey for core from 10.0.0.1 port 41408 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:34.481000 audit[3669]: CRED_ACQ pid=3669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.481000 audit[3669]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca86edfe0 a2=3 a3=0 items=0 ppid=1 pid=3669 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.481000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:34.481918 sshd[3669]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:34.486474 systemd-logind[1201]: New session 13 of user core. May 15 10:39:34.487450 systemd[1]: Started session-13.scope. May 15 10:39:34.492000 audit[3669]: USER_START pid=3669 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.494000 audit[3678]: CRED_ACQ pid=3678 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.597760 sshd[3669]: pam_unix(sshd:session): session closed for user core May 15 10:39:34.598000 audit[3669]: USER_END pid=3669 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.598000 audit[3669]: CRED_DISP pid=3669 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:34.600200 systemd[1]: sshd@12-10.0.0.52:22-10.0.0.1:41408.service: Deactivated successfully. May 15 10:39:34.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.52:22-10.0.0.1:41408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:34.601017 systemd[1]: session-13.scope: Deactivated successfully. May 15 10:39:34.601646 systemd-logind[1201]: Session 13 logged out. Waiting for processes to exit. May 15 10:39:34.602451 systemd-logind[1201]: Removed session 13. May 15 10:39:35.188607 systemd-networkd[1039]: vxlan.calico: Gained IPv6LL May 15 10:39:35.442621 kubelet[1951]: E0515 10:39:35.442502 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:35.848618 env[1217]: time="2025-05-15T10:39:35.848492887Z" level=info msg="StopPodSandbox for \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\"" May 15 10:39:35.848977 env[1217]: time="2025-05-15T10:39:35.848675439Z" level=info msg="StopPodSandbox for \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\"" May 15 10:39:35.892555 systemd-networkd[1039]: cali2edb58d86d2: Gained IPv6LL May 15 10:39:35.971000 audit[3749]: NETFILTER_CFG table=filter:108 family=2 entries=13 op=nft_register_rule pid=3749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:35.971000 audit[3749]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc86f0e670 a2=0 a3=7ffc86f0e65c items=0 ppid=2102 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:35.971000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:35.980000 audit[3749]: NETFILTER_CFG table=nat:109 family=2 entries=35 op=nft_register_chain pid=3749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:35.980000 audit[3749]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc86f0e670 a2=0 a3=7ffc86f0e65c items=0 ppid=2102 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:35.980000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:35.998686 env[1217]: 2025-05-15 10:39:35.956 [INFO][3727] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" May 15 10:39:35.998686 env[1217]: 2025-05-15 10:39:35.957 [INFO][3727] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" iface="eth0" netns="/var/run/netns/cni-bee7fd6f-ca06-8c25-67ea-7a73706e49ee" May 15 10:39:35.998686 env[1217]: 2025-05-15 10:39:35.957 [INFO][3727] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" iface="eth0" netns="/var/run/netns/cni-bee7fd6f-ca06-8c25-67ea-7a73706e49ee" May 15 10:39:35.998686 env[1217]: 2025-05-15 10:39:35.957 [INFO][3727] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" iface="eth0" netns="/var/run/netns/cni-bee7fd6f-ca06-8c25-67ea-7a73706e49ee" May 15 10:39:35.998686 env[1217]: 2025-05-15 10:39:35.957 [INFO][3727] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" May 15 10:39:35.998686 env[1217]: 2025-05-15 10:39:35.957 [INFO][3727] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" May 15 10:39:35.998686 env[1217]: 2025-05-15 10:39:35.986 [INFO][3750] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" HandleID="k8s-pod-network.57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" Workload="localhost-k8s-csi--node--driver--b7nq8-eth0" May 15 10:39:35.998686 env[1217]: 2025-05-15 10:39:35.986 [INFO][3750] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:35.998686 env[1217]: 2025-05-15 10:39:35.986 [INFO][3750] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:35.998686 env[1217]: 2025-05-15 10:39:35.992 [WARNING][3750] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" HandleID="k8s-pod-network.57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" Workload="localhost-k8s-csi--node--driver--b7nq8-eth0" May 15 10:39:35.998686 env[1217]: 2025-05-15 10:39:35.992 [INFO][3750] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" HandleID="k8s-pod-network.57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" Workload="localhost-k8s-csi--node--driver--b7nq8-eth0" May 15 10:39:35.998686 env[1217]: 2025-05-15 10:39:35.993 [INFO][3750] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:35.998686 env[1217]: 2025-05-15 10:39:35.997 [INFO][3727] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" May 15 10:39:36.000983 systemd[1]: run-netns-cni\x2dbee7fd6f\x2dca06\x2d8c25\x2d67ea\x2d7a73706e49ee.mount: Deactivated successfully. May 15 10:39:36.001811 env[1217]: time="2025-05-15T10:39:36.001765943Z" level=info msg="TearDown network for sandbox \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\" successfully" May 15 10:39:36.001811 env[1217]: time="2025-05-15T10:39:36.001806759Z" level=info msg="StopPodSandbox for \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\" returns successfully" May 15 10:39:36.002623 env[1217]: time="2025-05-15T10:39:36.002593816Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-b7nq8,Uid:5de422bf-365e-4b7f-b2a7-451d003a44f6,Namespace:calico-system,Attempt:1,}" May 15 10:39:36.011718 env[1217]: 2025-05-15 10:39:35.948 [INFO][3726] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" May 15 10:39:36.011718 env[1217]: 2025-05-15 10:39:35.948 [INFO][3726] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" iface="eth0" netns="/var/run/netns/cni-62cf6c1f-42f2-54b5-e646-efb4a959d02b" May 15 10:39:36.011718 env[1217]: 2025-05-15 10:39:35.948 [INFO][3726] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" iface="eth0" netns="/var/run/netns/cni-62cf6c1f-42f2-54b5-e646-efb4a959d02b" May 15 10:39:36.011718 env[1217]: 2025-05-15 10:39:35.949 [INFO][3726] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" iface="eth0" netns="/var/run/netns/cni-62cf6c1f-42f2-54b5-e646-efb4a959d02b" May 15 10:39:36.011718 env[1217]: 2025-05-15 10:39:35.949 [INFO][3726] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" May 15 10:39:36.011718 env[1217]: 2025-05-15 10:39:35.949 [INFO][3726] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" May 15 10:39:36.011718 env[1217]: 2025-05-15 10:39:35.988 [INFO][3742] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" HandleID="k8s-pod-network.6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" Workload="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" May 15 10:39:36.011718 env[1217]: 2025-05-15 10:39:35.988 [INFO][3742] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:36.011718 env[1217]: 2025-05-15 10:39:35.993 [INFO][3742] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:36.011718 env[1217]: 2025-05-15 10:39:36.003 [WARNING][3742] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" HandleID="k8s-pod-network.6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" Workload="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" May 15 10:39:36.011718 env[1217]: 2025-05-15 10:39:36.004 [INFO][3742] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" HandleID="k8s-pod-network.6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" Workload="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" May 15 10:39:36.011718 env[1217]: 2025-05-15 10:39:36.005 [INFO][3742] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:36.011718 env[1217]: 2025-05-15 10:39:36.009 [INFO][3726] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" May 15 10:39:36.012698 env[1217]: time="2025-05-15T10:39:36.012658851Z" level=info msg="TearDown network for sandbox \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\" successfully" May 15 10:39:36.012814 env[1217]: time="2025-05-15T10:39:36.012790588Z" level=info msg="StopPodSandbox for \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\" returns successfully" May 15 10:39:36.013587 env[1217]: time="2025-05-15T10:39:36.013566093Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c6767cb7f-5grml,Uid:486bd89b-05b8-49ca-8103-b4cb3d3a867d,Namespace:calico-apiserver,Attempt:1,}" May 15 10:39:36.014674 systemd[1]: run-netns-cni\x2d62cf6c1f\x2d42f2\x2d54b5\x2de646\x2defb4a959d02b.mount: Deactivated successfully. May 15 10:39:36.124987 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:39:36.125115 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie4f8f1b6be5: link becomes ready May 15 10:39:36.125284 systemd-networkd[1039]: calie4f8f1b6be5: Link UP May 15 10:39:36.125570 systemd-networkd[1039]: calie4f8f1b6be5: Gained carrier May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.054 [INFO][3761] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--b7nq8-eth0 csi-node-driver- calico-system 5de422bf-365e-4b7f-b2a7-451d003a44f6 970 0 2025-05-15 10:39:03 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-b7nq8 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calie4f8f1b6be5 [] []}} ContainerID="3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" Namespace="calico-system" Pod="csi-node-driver-b7nq8" WorkloadEndpoint="localhost-k8s-csi--node--driver--b7nq8-" May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.054 [INFO][3761] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" Namespace="calico-system" Pod="csi-node-driver-b7nq8" WorkloadEndpoint="localhost-k8s-csi--node--driver--b7nq8-eth0" May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.083 [INFO][3786] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" HandleID="k8s-pod-network.3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" Workload="localhost-k8s-csi--node--driver--b7nq8-eth0" May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.091 [INFO][3786] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" HandleID="k8s-pod-network.3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" Workload="localhost-k8s-csi--node--driver--b7nq8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005bbf50), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-b7nq8", "timestamp":"2025-05-15 10:39:36.083731026 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.091 [INFO][3786] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.091 [INFO][3786] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.091 [INFO][3786] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.092 [INFO][3786] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" host="localhost" May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.096 [INFO][3786] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.100 [INFO][3786] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.102 [INFO][3786] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.105 [INFO][3786] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.105 [INFO][3786] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" host="localhost" May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.107 [INFO][3786] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2 May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.110 [INFO][3786] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" host="localhost" May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.115 [INFO][3786] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" host="localhost" May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.115 [INFO][3786] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" host="localhost" May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.115 [INFO][3786] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:36.137469 env[1217]: 2025-05-15 10:39:36.115 [INFO][3786] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" HandleID="k8s-pod-network.3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" Workload="localhost-k8s-csi--node--driver--b7nq8-eth0" May 15 10:39:36.138509 env[1217]: 2025-05-15 10:39:36.117 [INFO][3761] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" Namespace="calico-system" Pod="csi-node-driver-b7nq8" WorkloadEndpoint="localhost-k8s-csi--node--driver--b7nq8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--b7nq8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5de422bf-365e-4b7f-b2a7-451d003a44f6", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-b7nq8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie4f8f1b6be5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:36.138509 env[1217]: 2025-05-15 10:39:36.117 [INFO][3761] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" Namespace="calico-system" Pod="csi-node-driver-b7nq8" WorkloadEndpoint="localhost-k8s-csi--node--driver--b7nq8-eth0" May 15 10:39:36.138509 env[1217]: 2025-05-15 10:39:36.117 [INFO][3761] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie4f8f1b6be5 ContainerID="3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" Namespace="calico-system" Pod="csi-node-driver-b7nq8" WorkloadEndpoint="localhost-k8s-csi--node--driver--b7nq8-eth0" May 15 10:39:36.138509 env[1217]: 2025-05-15 10:39:36.125 [INFO][3761] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" Namespace="calico-system" Pod="csi-node-driver-b7nq8" WorkloadEndpoint="localhost-k8s-csi--node--driver--b7nq8-eth0" May 15 10:39:36.138509 env[1217]: 2025-05-15 10:39:36.126 [INFO][3761] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" Namespace="calico-system" Pod="csi-node-driver-b7nq8" WorkloadEndpoint="localhost-k8s-csi--node--driver--b7nq8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--b7nq8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5de422bf-365e-4b7f-b2a7-451d003a44f6", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2", Pod:"csi-node-driver-b7nq8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie4f8f1b6be5", MAC:"1a:8c:7a:0e:fa:f1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:36.138509 env[1217]: 2025-05-15 10:39:36.133 [INFO][3761] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2" Namespace="calico-system" Pod="csi-node-driver-b7nq8" WorkloadEndpoint="localhost-k8s-csi--node--driver--b7nq8-eth0" May 15 10:39:36.144000 audit[3819]: NETFILTER_CFG table=filter:110 family=2 entries=38 op=nft_register_chain pid=3819 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:36.144000 audit[3819]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd348ed720 a2=0 a3=7ffd348ed70c items=0 ppid=3297 pid=3819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:36.144000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:36.154288 env[1217]: time="2025-05-15T10:39:36.154208675Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:36.154288 env[1217]: time="2025-05-15T10:39:36.154248380Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:36.154540 env[1217]: time="2025-05-15T10:39:36.154259220Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:36.154652 env[1217]: time="2025-05-15T10:39:36.154606993Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2 pid=3827 runtime=io.containerd.runc.v2 May 15 10:39:36.166087 systemd[1]: Started cri-containerd-3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2.scope. May 15 10:39:36.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.175000 audit: BPF prog-id=166 op=LOAD May 15 10:39:36.176000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3827 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:36.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363353764656238646639323334653739323139666561346330303036 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3827 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:36.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363353764656238646639323334653739323139666561346330303036 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit: BPF prog-id=167 op=LOAD May 15 10:39:36.176000 audit[3837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000305690 items=0 ppid=3827 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:36.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363353764656238646639323334653739323139666561346330303036 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit: BPF prog-id=168 op=LOAD May 15 10:39:36.176000 audit[3837]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003056d8 items=0 ppid=3827 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:36.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363353764656238646639323334653739323139666561346330303036 May 15 10:39:36.176000 audit: BPF prog-id=168 op=UNLOAD May 15 10:39:36.176000 audit: BPF prog-id=167 op=UNLOAD May 15 10:39:36.176000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.176000 audit: BPF prog-id=169 op=LOAD May 15 10:39:36.176000 audit[3837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000305ae8 items=0 ppid=3827 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:36.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363353764656238646639323334653739323139666561346330303036 May 15 10:39:36.177697 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:39:36.185802 env[1217]: time="2025-05-15T10:39:36.185760344Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-b7nq8,Uid:5de422bf-365e-4b7f-b2a7-451d003a44f6,Namespace:calico-system,Attempt:1,} returns sandbox id \"3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2\"" May 15 10:39:36.187519 env[1217]: time="2025-05-15T10:39:36.187491934Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 10:39:36.411516 systemd-networkd[1039]: cali1803b3a5012: Link UP May 15 10:39:36.412564 systemd-networkd[1039]: cali1803b3a5012: Gained carrier May 15 10:39:36.413395 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1803b3a5012: link becomes ready May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.083 [INFO][3773] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0 calico-apiserver-c6767cb7f- calico-apiserver 486bd89b-05b8-49ca-8103-b4cb3d3a867d 965 0 2025-05-15 10:39:03 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:c6767cb7f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-c6767cb7f-5grml eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1803b3a5012 [] []}} ContainerID="58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" Namespace="calico-apiserver" Pod="calico-apiserver-c6767cb7f-5grml" WorkloadEndpoint="localhost-k8s-calico--apiserver--c6767cb7f--5grml-" May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.083 [INFO][3773] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" Namespace="calico-apiserver" Pod="calico-apiserver-c6767cb7f-5grml" WorkloadEndpoint="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.115 [INFO][3796] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" HandleID="k8s-pod-network.58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" Workload="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.351 [INFO][3796] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" HandleID="k8s-pod-network.58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" Workload="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005024c0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-c6767cb7f-5grml", "timestamp":"2025-05-15 10:39:36.115981446 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.351 [INFO][3796] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.351 [INFO][3796] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.351 [INFO][3796] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.353 [INFO][3796] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" host="localhost" May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.357 [INFO][3796] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.361 [INFO][3796] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.363 [INFO][3796] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.364 [INFO][3796] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.364 [INFO][3796] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" host="localhost" May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.365 [INFO][3796] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855 May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.370 [INFO][3796] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" host="localhost" May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.407 [INFO][3796] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" host="localhost" May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.408 [INFO][3796] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" host="localhost" May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.408 [INFO][3796] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:36.427170 env[1217]: 2025-05-15 10:39:36.408 [INFO][3796] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" HandleID="k8s-pod-network.58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" Workload="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" May 15 10:39:36.427969 env[1217]: 2025-05-15 10:39:36.409 [INFO][3773] cni-plugin/k8s.go 386: Populated endpoint ContainerID="58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" Namespace="calico-apiserver" Pod="calico-apiserver-c6767cb7f-5grml" WorkloadEndpoint="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0", GenerateName:"calico-apiserver-c6767cb7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"486bd89b-05b8-49ca-8103-b4cb3d3a867d", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c6767cb7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-c6767cb7f-5grml", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1803b3a5012", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:36.427969 env[1217]: 2025-05-15 10:39:36.410 [INFO][3773] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" Namespace="calico-apiserver" Pod="calico-apiserver-c6767cb7f-5grml" WorkloadEndpoint="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" May 15 10:39:36.427969 env[1217]: 2025-05-15 10:39:36.410 [INFO][3773] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1803b3a5012 ContainerID="58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" Namespace="calico-apiserver" Pod="calico-apiserver-c6767cb7f-5grml" WorkloadEndpoint="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" May 15 10:39:36.427969 env[1217]: 2025-05-15 10:39:36.412 [INFO][3773] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" Namespace="calico-apiserver" Pod="calico-apiserver-c6767cb7f-5grml" WorkloadEndpoint="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" May 15 10:39:36.427969 env[1217]: 2025-05-15 10:39:36.412 [INFO][3773] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" Namespace="calico-apiserver" Pod="calico-apiserver-c6767cb7f-5grml" WorkloadEndpoint="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0", GenerateName:"calico-apiserver-c6767cb7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"486bd89b-05b8-49ca-8103-b4cb3d3a867d", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c6767cb7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855", Pod:"calico-apiserver-c6767cb7f-5grml", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1803b3a5012", MAC:"ce:c0:4d:97:ea:44", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:36.427969 env[1217]: 2025-05-15 10:39:36.424 [INFO][3773] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855" Namespace="calico-apiserver" Pod="calico-apiserver-c6767cb7f-5grml" WorkloadEndpoint="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" May 15 10:39:36.434000 audit[3874]: NETFILTER_CFG table=filter:111 family=2 entries=48 op=nft_register_chain pid=3874 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:36.434000 audit[3874]: SYSCALL arch=c000003e syscall=46 success=yes exit=25868 a0=3 a1=7ffd3bf2da90 a2=0 a3=7ffd3bf2da7c items=0 ppid=3297 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:36.434000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:36.440827 env[1217]: time="2025-05-15T10:39:36.440763301Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:36.440827 env[1217]: time="2025-05-15T10:39:36.440804278Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:36.440827 env[1217]: time="2025-05-15T10:39:36.440815148Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:36.441001 env[1217]: time="2025-05-15T10:39:36.440957876Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855 pid=3882 runtime=io.containerd.runc.v2 May 15 10:39:36.445172 kubelet[1951]: E0515 10:39:36.445142 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:36.452760 systemd[1]: Started cri-containerd-58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855.scope. May 15 10:39:36.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit: BPF prog-id=170 op=LOAD May 15 10:39:36.465000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3882 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:36.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538626530353663666630613738636663393237353331613666663166 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3882 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:36.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538626530353663666630613738636663393237353331613666663166 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit: BPF prog-id=171 op=LOAD May 15 10:39:36.465000 audit[3892]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000275d90 items=0 ppid=3882 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:36.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538626530353663666630613738636663393237353331613666663166 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit: BPF prog-id=172 op=LOAD May 15 10:39:36.465000 audit[3892]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000275dd8 items=0 ppid=3882 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:36.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538626530353663666630613738636663393237353331613666663166 May 15 10:39:36.465000 audit: BPF prog-id=172 op=UNLOAD May 15 10:39:36.465000 audit: BPF prog-id=171 op=UNLOAD May 15 10:39:36.465000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:36.465000 audit: BPF prog-id=173 op=LOAD May 15 10:39:36.465000 audit[3892]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ec1e8 items=0 ppid=3882 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:36.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538626530353663666630613738636663393237353331613666663166 May 15 10:39:36.466810 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:39:36.486442 env[1217]: time="2025-05-15T10:39:36.486408215Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c6767cb7f-5grml,Uid:486bd89b-05b8-49ca-8103-b4cb3d3a867d,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855\"" May 15 10:39:37.172727 systemd-networkd[1039]: calie4f8f1b6be5: Gained IPv6LL May 15 10:39:37.448702 kubelet[1951]: E0515 10:39:37.448600 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:37.556541 systemd-networkd[1039]: cali1803b3a5012: Gained IPv6LL May 15 10:39:38.247843 env[1217]: time="2025-05-15T10:39:38.247781577Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:38.249708 env[1217]: time="2025-05-15T10:39:38.249668709Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:38.251131 env[1217]: time="2025-05-15T10:39:38.251097921Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:38.252845 env[1217]: time="2025-05-15T10:39:38.252812560Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:38.253298 env[1217]: time="2025-05-15T10:39:38.253263466Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 10:39:38.254281 env[1217]: time="2025-05-15T10:39:38.254257622Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:39:38.255176 env[1217]: time="2025-05-15T10:39:38.255153674Z" level=info msg="CreateContainer within sandbox \"3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 10:39:38.269546 env[1217]: time="2025-05-15T10:39:38.269498640Z" level=info msg="CreateContainer within sandbox \"3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"06c35f2f11197ae94f8cedb852dd021e07c3a32eaa2d84b00deb5991d4264bbd\"" May 15 10:39:38.270094 env[1217]: time="2025-05-15T10:39:38.270039776Z" level=info msg="StartContainer for \"06c35f2f11197ae94f8cedb852dd021e07c3a32eaa2d84b00deb5991d4264bbd\"" May 15 10:39:38.291045 systemd[1]: run-containerd-runc-k8s.io-06c35f2f11197ae94f8cedb852dd021e07c3a32eaa2d84b00deb5991d4264bbd-runc.tG37ZB.mount: Deactivated successfully. May 15 10:39:38.293644 systemd[1]: Started cri-containerd-06c35f2f11197ae94f8cedb852dd021e07c3a32eaa2d84b00deb5991d4264bbd.scope. May 15 10:39:38.307000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.307000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc4463c35f8 items=0 ppid=3827 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:38.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036633335663266313131393761653934663863656462383532646430 May 15 10:39:38.307000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.307000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.307000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.307000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.307000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.307000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.307000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.307000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.307000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.307000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.307000 audit: BPF prog-id=174 op=LOAD May 15 10:39:38.307000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002ee018 items=0 ppid=3827 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:38.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036633335663266313131393761653934663863656462383532646430 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit: BPF prog-id=175 op=LOAD May 15 10:39:38.308000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002ee068 items=0 ppid=3827 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:38.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036633335663266313131393761653934663863656462383532646430 May 15 10:39:38.308000 audit: BPF prog-id=175 op=UNLOAD May 15 10:39:38.308000 audit: BPF prog-id=174 op=UNLOAD May 15 10:39:38.308000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:38.308000 audit: BPF prog-id=176 op=LOAD May 15 10:39:38.308000 audit[3922]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002ee0f8 items=0 ppid=3827 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:38.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036633335663266313131393761653934663863656462383532646430 May 15 10:39:38.320299 env[1217]: time="2025-05-15T10:39:38.320248607Z" level=info msg="StartContainer for \"06c35f2f11197ae94f8cedb852dd021e07c3a32eaa2d84b00deb5991d4264bbd\" returns successfully" May 15 10:39:39.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.52:22-10.0.0.1:41410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:39.602112 systemd[1]: Started sshd@13-10.0.0.52:22-10.0.0.1:41410.service. May 15 10:39:39.603213 kernel: kauditd_printk_skb: 318 callbacks suppressed May 15 10:39:39.603268 kernel: audit: type=1130 audit(1747305579.601:1254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.52:22-10.0.0.1:41410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:39.644000 audit[3956]: USER_ACCT pid=3956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:39.645099 sshd[3956]: Accepted publickey for core from 10.0.0.1 port 41410 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:39.648000 audit[3956]: CRED_ACQ pid=3956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:39.649534 sshd[3956]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:39.653488 kernel: audit: type=1101 audit(1747305579.644:1255): pid=3956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:39.653549 kernel: audit: type=1103 audit(1747305579.648:1256): pid=3956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:39.653649 kernel: audit: type=1006 audit(1747305579.648:1257): pid=3956 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 15 10:39:39.653189 systemd-logind[1201]: New session 14 of user core. May 15 10:39:39.654005 systemd[1]: Started session-14.scope. May 15 10:39:39.648000 audit[3956]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd921d7630 a2=3 a3=0 items=0 ppid=1 pid=3956 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:39.659594 kernel: audit: type=1300 audit(1747305579.648:1257): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd921d7630 a2=3 a3=0 items=0 ppid=1 pid=3956 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:39.648000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:39.661185 kernel: audit: type=1327 audit(1747305579.648:1257): proctitle=737368643A20636F7265205B707269765D May 15 10:39:39.661242 kernel: audit: type=1105 audit(1747305579.655:1258): pid=3956 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:39.655000 audit[3956]: USER_START pid=3956 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:39.665589 kernel: audit: type=1103 audit(1747305579.659:1259): pid=3958 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:39.659000 audit[3958]: CRED_ACQ pid=3958 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:40.339745 sshd[3956]: pam_unix(sshd:session): session closed for user core May 15 10:39:40.340000 audit[3956]: USER_END pid=3956 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:40.342217 systemd[1]: sshd@13-10.0.0.52:22-10.0.0.1:41410.service: Deactivated successfully. May 15 10:39:40.342985 systemd[1]: session-14.scope: Deactivated successfully. May 15 10:39:40.343587 systemd-logind[1201]: Session 14 logged out. Waiting for processes to exit. May 15 10:39:40.344381 systemd-logind[1201]: Removed session 14. May 15 10:39:40.340000 audit[3956]: CRED_DISP pid=3956 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:40.348430 kernel: audit: type=1106 audit(1747305580.340:1260): pid=3956 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:40.348491 kernel: audit: type=1104 audit(1747305580.340:1261): pid=3956 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:40.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.52:22-10.0.0.1:41410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:41.598772 env[1217]: time="2025-05-15T10:39:41.598669606Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:41.600333 env[1217]: time="2025-05-15T10:39:41.600293143Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:41.601964 env[1217]: time="2025-05-15T10:39:41.601905378Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:41.604066 env[1217]: time="2025-05-15T10:39:41.604039063Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:41.604655 env[1217]: time="2025-05-15T10:39:41.604607379Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 10:39:41.606353 env[1217]: time="2025-05-15T10:39:41.606323650Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 10:39:41.606906 env[1217]: time="2025-05-15T10:39:41.606878903Z" level=info msg="CreateContainer within sandbox \"58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:39:41.618894 env[1217]: time="2025-05-15T10:39:41.618838148Z" level=info msg="CreateContainer within sandbox \"58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e0237b3067df902b8dd53232e0abd47348cea17235c9a93bdb2fcdc021c35c95\"" May 15 10:39:41.619385 env[1217]: time="2025-05-15T10:39:41.619339929Z" level=info msg="StartContainer for \"e0237b3067df902b8dd53232e0abd47348cea17235c9a93bdb2fcdc021c35c95\"" May 15 10:39:41.636429 systemd[1]: Started cri-containerd-e0237b3067df902b8dd53232e0abd47348cea17235c9a93bdb2fcdc021c35c95.scope. May 15 10:39:41.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.648000 audit: BPF prog-id=177 op=LOAD May 15 10:39:41.649000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3882 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530323337623330363764663930326238646435333233326530616264 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3882 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530323337623330363764663930326238646435333233326530616264 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit: BPF prog-id=178 op=LOAD May 15 10:39:41.649000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000333d40 items=0 ppid=3882 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530323337623330363764663930326238646435333233326530616264 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit: BPF prog-id=179 op=LOAD May 15 10:39:41.649000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000333d88 items=0 ppid=3882 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530323337623330363764663930326238646435333233326530616264 May 15 10:39:41.649000 audit: BPF prog-id=179 op=UNLOAD May 15 10:39:41.649000 audit: BPF prog-id=178 op=UNLOAD May 15 10:39:41.649000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.649000 audit: BPF prog-id=180 op=LOAD May 15 10:39:41.649000 audit[3977]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a2198 items=0 ppid=3882 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530323337623330363764663930326238646435333233326530616264 May 15 10:39:41.676591 env[1217]: time="2025-05-15T10:39:41.676536444Z" level=info msg="StartContainer for \"e0237b3067df902b8dd53232e0abd47348cea17235c9a93bdb2fcdc021c35c95\" returns successfully" May 15 10:39:42.627000 audit[4009]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=4009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:42.627000 audit[4009]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc79670f80 a2=0 a3=7ffc79670f6c items=0 ppid=2102 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:42.627000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:42.632000 audit[4009]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=4009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:42.632000 audit[4009]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc79670f80 a2=0 a3=7ffc79670f6c items=0 ppid=2102 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:42.632000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:42.848929 env[1217]: time="2025-05-15T10:39:42.848866150Z" level=info msg="StopPodSandbox for \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\"" May 15 10:39:42.895557 kubelet[1951]: I0515 10:39:42.895405 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-c6767cb7f-5grml" podStartSLOduration=34.777364404 podStartE2EDuration="39.895343815s" podCreationTimestamp="2025-05-15 10:39:03 +0000 UTC" firstStartedPulling="2025-05-15 10:39:36.487606875 +0000 UTC m=+46.717084683" lastFinishedPulling="2025-05-15 10:39:41.605586266 +0000 UTC m=+51.835064094" observedRunningTime="2025-05-15 10:39:42.571522416 +0000 UTC m=+52.801000234" watchObservedRunningTime="2025-05-15 10:39:42.895343815 +0000 UTC m=+53.124821633" May 15 10:39:42.944959 env[1217]: 2025-05-15 10:39:42.896 [INFO][4026] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" May 15 10:39:42.944959 env[1217]: 2025-05-15 10:39:42.896 [INFO][4026] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" iface="eth0" netns="/var/run/netns/cni-fd959e3a-f1d0-1f41-d8b1-e92ec749c47f" May 15 10:39:42.944959 env[1217]: 2025-05-15 10:39:42.897 [INFO][4026] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" iface="eth0" netns="/var/run/netns/cni-fd959e3a-f1d0-1f41-d8b1-e92ec749c47f" May 15 10:39:42.944959 env[1217]: 2025-05-15 10:39:42.897 [INFO][4026] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" iface="eth0" netns="/var/run/netns/cni-fd959e3a-f1d0-1f41-d8b1-e92ec749c47f" May 15 10:39:42.944959 env[1217]: 2025-05-15 10:39:42.897 [INFO][4026] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" May 15 10:39:42.944959 env[1217]: 2025-05-15 10:39:42.897 [INFO][4026] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" May 15 10:39:42.944959 env[1217]: 2025-05-15 10:39:42.924 [INFO][4035] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" HandleID="k8s-pod-network.6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" Workload="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" May 15 10:39:42.944959 env[1217]: 2025-05-15 10:39:42.924 [INFO][4035] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:42.944959 env[1217]: 2025-05-15 10:39:42.924 [INFO][4035] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:42.944959 env[1217]: 2025-05-15 10:39:42.939 [WARNING][4035] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" HandleID="k8s-pod-network.6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" Workload="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" May 15 10:39:42.944959 env[1217]: 2025-05-15 10:39:42.939 [INFO][4035] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" HandleID="k8s-pod-network.6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" Workload="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" May 15 10:39:42.944959 env[1217]: 2025-05-15 10:39:42.941 [INFO][4035] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:42.944959 env[1217]: 2025-05-15 10:39:42.943 [INFO][4026] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" May 15 10:39:42.945831 env[1217]: time="2025-05-15T10:39:42.945776713Z" level=info msg="TearDown network for sandbox \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\" successfully" May 15 10:39:42.945831 env[1217]: time="2025-05-15T10:39:42.945816989Z" level=info msg="StopPodSandbox for \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\" returns successfully" May 15 10:39:42.946608 env[1217]: time="2025-05-15T10:39:42.946549954Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c6767cb7f-vt2wp,Uid:d27729e0-fe3d-4ead-899b-fa0ef12160ff,Namespace:calico-apiserver,Attempt:1,}" May 15 10:39:42.947528 systemd[1]: run-netns-cni\x2dfd959e3a\x2df1d0\x2d1f41\x2dd8b1\x2de92ec749c47f.mount: Deactivated successfully. May 15 10:39:43.104401 systemd-networkd[1039]: cali7def654836d: Link UP May 15 10:39:43.106470 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:39:43.106521 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7def654836d: link becomes ready May 15 10:39:43.106983 systemd-networkd[1039]: cali7def654836d: Gained carrier May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.039 [INFO][4045] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0 calico-apiserver-c6767cb7f- calico-apiserver d27729e0-fe3d-4ead-899b-fa0ef12160ff 1008 0 2025-05-15 10:39:03 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:c6767cb7f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-c6767cb7f-vt2wp eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7def654836d [] []}} ContainerID="264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" Namespace="calico-apiserver" Pod="calico-apiserver-c6767cb7f-vt2wp" WorkloadEndpoint="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-" May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.039 [INFO][4045] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" Namespace="calico-apiserver" Pod="calico-apiserver-c6767cb7f-vt2wp" WorkloadEndpoint="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.066 [INFO][4059] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" HandleID="k8s-pod-network.264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" Workload="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.075 [INFO][4059] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" HandleID="k8s-pod-network.264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" Workload="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003095a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-c6767cb7f-vt2wp", "timestamp":"2025-05-15 10:39:43.066752566 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.075 [INFO][4059] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.075 [INFO][4059] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.075 [INFO][4059] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.077 [INFO][4059] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" host="localhost" May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.080 [INFO][4059] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.084 [INFO][4059] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.085 [INFO][4059] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.087 [INFO][4059] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.087 [INFO][4059] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" host="localhost" May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.088 [INFO][4059] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0 May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.091 [INFO][4059] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" host="localhost" May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.096 [INFO][4059] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" host="localhost" May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.096 [INFO][4059] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" host="localhost" May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.097 [INFO][4059] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:43.125641 env[1217]: 2025-05-15 10:39:43.097 [INFO][4059] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" HandleID="k8s-pod-network.264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" Workload="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" May 15 10:39:43.126419 env[1217]: 2025-05-15 10:39:43.101 [INFO][4045] cni-plugin/k8s.go 386: Populated endpoint ContainerID="264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" Namespace="calico-apiserver" Pod="calico-apiserver-c6767cb7f-vt2wp" WorkloadEndpoint="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0", GenerateName:"calico-apiserver-c6767cb7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"d27729e0-fe3d-4ead-899b-fa0ef12160ff", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c6767cb7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-c6767cb7f-vt2wp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7def654836d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:43.126419 env[1217]: 2025-05-15 10:39:43.101 [INFO][4045] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" Namespace="calico-apiserver" Pod="calico-apiserver-c6767cb7f-vt2wp" WorkloadEndpoint="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" May 15 10:39:43.126419 env[1217]: 2025-05-15 10:39:43.102 [INFO][4045] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7def654836d ContainerID="264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" Namespace="calico-apiserver" Pod="calico-apiserver-c6767cb7f-vt2wp" WorkloadEndpoint="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" May 15 10:39:43.126419 env[1217]: 2025-05-15 10:39:43.106 [INFO][4045] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" Namespace="calico-apiserver" Pod="calico-apiserver-c6767cb7f-vt2wp" WorkloadEndpoint="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" May 15 10:39:43.126419 env[1217]: 2025-05-15 10:39:43.106 [INFO][4045] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" Namespace="calico-apiserver" Pod="calico-apiserver-c6767cb7f-vt2wp" WorkloadEndpoint="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0", GenerateName:"calico-apiserver-c6767cb7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"d27729e0-fe3d-4ead-899b-fa0ef12160ff", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c6767cb7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0", Pod:"calico-apiserver-c6767cb7f-vt2wp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7def654836d", MAC:"ea:68:c2:3c:48:c6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:43.126419 env[1217]: 2025-05-15 10:39:43.117 [INFO][4045] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0" Namespace="calico-apiserver" Pod="calico-apiserver-c6767cb7f-vt2wp" WorkloadEndpoint="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" May 15 10:39:43.137000 audit[4083]: NETFILTER_CFG table=filter:114 family=2 entries=42 op=nft_register_chain pid=4083 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:43.137000 audit[4083]: SYSCALL arch=c000003e syscall=46 success=yes exit=22704 a0=3 a1=7ffcadae3d60 a2=0 a3=7ffcadae3d4c items=0 ppid=3297 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:43.137000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:43.158151 env[1217]: time="2025-05-15T10:39:43.148554920Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:43.158151 env[1217]: time="2025-05-15T10:39:43.148600024Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:43.158151 env[1217]: time="2025-05-15T10:39:43.148631633Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:43.158151 env[1217]: time="2025-05-15T10:39:43.148839194Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0 pid=4091 runtime=io.containerd.runc.v2 May 15 10:39:43.176000 audit[3987]: AVC avc: denied { watch } for pid=3987 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_39_19.2617362448/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c812,c829 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c812,c829 tclass=file permissive=0 May 15 10:39:43.176000 audit[3987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001984100 a2=fc6 a3=0 items=0 ppid=3882 pid=3987 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c812,c829 key=(null) May 15 10:39:43.176000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:39:43.183782 systemd[1]: Started cri-containerd-264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0.scope. May 15 10:39:43.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.200000 audit: BPF prog-id=181 op=LOAD May 15 10:39:43.201000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4091 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:43.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236346566333466333839383764643338393039623330393037393139 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4091 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:43.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236346566333466333839383764643338393039623330393037393139 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit: BPF prog-id=182 op=LOAD May 15 10:39:43.201000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032da60 items=0 ppid=4091 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:43.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236346566333466333839383764643338393039623330393037393139 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit: BPF prog-id=183 op=LOAD May 15 10:39:43.201000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032daa8 items=0 ppid=4091 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:43.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236346566333466333839383764643338393039623330393037393139 May 15 10:39:43.201000 audit: BPF prog-id=183 op=UNLOAD May 15 10:39:43.201000 audit: BPF prog-id=182 op=UNLOAD May 15 10:39:43.201000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { perfmon } for pid=4101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit[4101]: AVC avc: denied { bpf } for pid=4101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:43.201000 audit: BPF prog-id=184 op=LOAD May 15 10:39:43.201000 audit[4101]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032deb8 items=0 ppid=4091 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:43.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236346566333466333839383764643338393039623330393037393139 May 15 10:39:43.202686 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:39:43.222523 env[1217]: time="2025-05-15T10:39:43.222473569Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c6767cb7f-vt2wp,Uid:d27729e0-fe3d-4ead-899b-fa0ef12160ff,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0\"" May 15 10:39:43.229352 env[1217]: time="2025-05-15T10:39:43.227294476Z" level=info msg="CreateContainer within sandbox \"264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:39:43.463493 kubelet[1951]: I0515 10:39:43.463465 1951 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:39:43.947580 systemd[1]: run-containerd-runc-k8s.io-264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0-runc.a4PpIq.mount: Deactivated successfully. May 15 10:39:44.692501 env[1217]: time="2025-05-15T10:39:44.692419781Z" level=info msg="CreateContainer within sandbox \"264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9fbf8d86553fb52685624fcdceaaacd0acdfab05220df58da733dd0e5f1dc6d2\"" May 15 10:39:44.693109 env[1217]: time="2025-05-15T10:39:44.693078006Z" level=info msg="StartContainer for \"9fbf8d86553fb52685624fcdceaaacd0acdfab05220df58da733dd0e5f1dc6d2\"" May 15 10:39:44.713265 systemd[1]: Started cri-containerd-9fbf8d86553fb52685624fcdceaaacd0acdfab05220df58da733dd0e5f1dc6d2.scope. May 15 10:39:44.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.735981 kernel: kauditd_printk_skb: 127 callbacks suppressed May 15 10:39:44.774840 kernel: audit: type=1400 audit(1747305584.722:1303): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.774909 kernel: audit: type=1400 audit(1747305584.722:1304): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.774927 kernel: audit: type=1400 audit(1747305584.723:1305): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.774941 kernel: audit: type=1400 audit(1747305584.723:1306): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.774959 kernel: audit: type=1400 audit(1747305584.723:1307): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.774977 kernel: audit: type=1400 audit(1747305584.723:1308): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.774995 kernel: audit: type=1400 audit(1747305584.723:1309): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.775015 kernel: audit: type=1400 audit(1747305584.723:1310): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.775030 kernel: audit: type=1400 audit(1747305584.723:1311): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.775046 kernel: audit: type=1400 audit(1747305584.730:1312): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.730000 audit: BPF prog-id=185 op=LOAD May 15 10:39:44.730000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.730000 audit[4138]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4091 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:44.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966626638643836353533666235323638353632346663646365616161 May 15 10:39:44.730000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.730000 audit[4138]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4091 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:44.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966626638643836353533666235323638353632346663646365616161 May 15 10:39:44.730000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.730000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.730000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.730000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.730000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.730000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.730000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.730000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.730000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.730000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.730000 audit: BPF prog-id=186 op=LOAD May 15 10:39:44.730000 audit[4138]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021adf0 items=0 ppid=4091 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:44.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966626638643836353533666235323638353632346663646365616161 May 15 10:39:44.732000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.732000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.732000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.732000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.732000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.732000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.732000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.732000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.732000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.732000 audit: BPF prog-id=187 op=LOAD May 15 10:39:44.732000 audit[4138]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021ae38 items=0 ppid=4091 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:44.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966626638643836353533666235323638353632346663646365616161 May 15 10:39:44.735000 audit: BPF prog-id=187 op=UNLOAD May 15 10:39:44.735000 audit: BPF prog-id=186 op=UNLOAD May 15 10:39:44.735000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.735000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.735000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.735000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.735000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.735000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.735000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.735000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.735000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.735000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:44.735000 audit: BPF prog-id=188 op=LOAD May 15 10:39:44.735000 audit[4138]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021b248 items=0 ppid=4091 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:44.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966626638643836353533666235323638353632346663646365616161 May 15 10:39:44.849350 env[1217]: time="2025-05-15T10:39:44.849295782Z" level=info msg="StopPodSandbox for \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\"" May 15 10:39:44.852966 env[1217]: time="2025-05-15T10:39:44.852920725Z" level=info msg="StartContainer for \"9fbf8d86553fb52685624fcdceaaacd0acdfab05220df58da733dd0e5f1dc6d2\" returns successfully" May 15 10:39:44.916945 systemd-networkd[1039]: cali7def654836d: Gained IPv6LL May 15 10:39:44.942091 env[1217]: 2025-05-15 10:39:44.898 [INFO][4183] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" May 15 10:39:44.942091 env[1217]: 2025-05-15 10:39:44.899 [INFO][4183] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" iface="eth0" netns="/var/run/netns/cni-35d6ae94-6267-5b01-abe6-b45af13d8ebe" May 15 10:39:44.942091 env[1217]: 2025-05-15 10:39:44.899 [INFO][4183] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" iface="eth0" netns="/var/run/netns/cni-35d6ae94-6267-5b01-abe6-b45af13d8ebe" May 15 10:39:44.942091 env[1217]: 2025-05-15 10:39:44.899 [INFO][4183] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" iface="eth0" netns="/var/run/netns/cni-35d6ae94-6267-5b01-abe6-b45af13d8ebe" May 15 10:39:44.942091 env[1217]: 2025-05-15 10:39:44.899 [INFO][4183] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" May 15 10:39:44.942091 env[1217]: 2025-05-15 10:39:44.899 [INFO][4183] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" May 15 10:39:44.942091 env[1217]: 2025-05-15 10:39:44.929 [INFO][4191] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" HandleID="k8s-pod-network.9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" Workload="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" May 15 10:39:44.942091 env[1217]: 2025-05-15 10:39:44.929 [INFO][4191] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:44.942091 env[1217]: 2025-05-15 10:39:44.929 [INFO][4191] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:44.942091 env[1217]: 2025-05-15 10:39:44.936 [WARNING][4191] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" HandleID="k8s-pod-network.9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" Workload="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" May 15 10:39:44.942091 env[1217]: 2025-05-15 10:39:44.936 [INFO][4191] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" HandleID="k8s-pod-network.9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" Workload="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" May 15 10:39:44.942091 env[1217]: 2025-05-15 10:39:44.938 [INFO][4191] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:44.942091 env[1217]: 2025-05-15 10:39:44.940 [INFO][4183] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" May 15 10:39:44.942667 env[1217]: time="2025-05-15T10:39:44.942260129Z" level=info msg="TearDown network for sandbox \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\" successfully" May 15 10:39:44.942667 env[1217]: time="2025-05-15T10:39:44.942305704Z" level=info msg="StopPodSandbox for \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\" returns successfully" May 15 10:39:44.942770 kubelet[1951]: E0515 10:39:44.942735 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:44.944164 env[1217]: time="2025-05-15T10:39:44.944131700Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-cjkpq,Uid:78023a57-4294-4669-bd3b-842d5d20e076,Namespace:kube-system,Attempt:1,}" May 15 10:39:44.949080 systemd[1]: run-netns-cni\x2d35d6ae94\x2d6267\x2d5b01\x2dabe6\x2db45af13d8ebe.mount: Deactivated successfully. May 15 10:39:45.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.52:22-10.0.0.1:43930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:45.344301 systemd[1]: Started sshd@14-10.0.0.52:22-10.0.0.1:43930.service. May 15 10:39:45.393000 audit[4221]: USER_ACCT pid=4221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:45.395111 sshd[4221]: Accepted publickey for core from 10.0.0.1 port 43930 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:45.395000 audit[4221]: CRED_ACQ pid=4221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:45.395000 audit[4221]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde262ab80 a2=3 a3=0 items=0 ppid=1 pid=4221 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.395000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:45.396156 sshd[4221]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:45.403078 systemd[1]: Started session-15.scope. May 15 10:39:45.404739 systemd-logind[1201]: New session 15 of user core. May 15 10:39:45.410000 audit[4221]: USER_START pid=4221 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:45.412000 audit[4224]: CRED_ACQ pid=4224 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:45.430498 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:39:45.430607 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliea29d83d590: link becomes ready May 15 10:39:45.431458 systemd-networkd[1039]: caliea29d83d590: Link UP May 15 10:39:45.431775 systemd-networkd[1039]: caliea29d83d590: Gained carrier May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.324 [INFO][4200] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0 coredns-668d6bf9bc- kube-system 78023a57-4294-4669-bd3b-842d5d20e076 1019 0 2025-05-15 10:38:55 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-cjkpq eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliea29d83d590 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" Namespace="kube-system" Pod="coredns-668d6bf9bc-cjkpq" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--cjkpq-" May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.324 [INFO][4200] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" Namespace="kube-system" Pod="coredns-668d6bf9bc-cjkpq" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.377 [INFO][4214] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" HandleID="k8s-pod-network.11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" Workload="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.390 [INFO][4214] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" HandleID="k8s-pod-network.11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" Workload="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003e2f50), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-cjkpq", "timestamp":"2025-05-15 10:39:45.377925363 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.390 [INFO][4214] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.390 [INFO][4214] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.390 [INFO][4214] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.393 [INFO][4214] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" host="localhost" May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.400 [INFO][4214] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.407 [INFO][4214] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.409 [INFO][4214] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.411 [INFO][4214] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.412 [INFO][4214] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" host="localhost" May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.414 [INFO][4214] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.417 [INFO][4214] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" host="localhost" May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.423 [INFO][4214] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" host="localhost" May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.423 [INFO][4214] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" host="localhost" May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.423 [INFO][4214] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:45.441505 env[1217]: 2025-05-15 10:39:45.423 [INFO][4214] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" HandleID="k8s-pod-network.11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" Workload="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" May 15 10:39:45.442147 env[1217]: 2025-05-15 10:39:45.426 [INFO][4200] cni-plugin/k8s.go 386: Populated endpoint ContainerID="11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" Namespace="kube-system" Pod="coredns-668d6bf9bc-cjkpq" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"78023a57-4294-4669-bd3b-842d5d20e076", ResourceVersion:"1019", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-cjkpq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliea29d83d590", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:45.442147 env[1217]: 2025-05-15 10:39:45.426 [INFO][4200] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" Namespace="kube-system" Pod="coredns-668d6bf9bc-cjkpq" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" May 15 10:39:45.442147 env[1217]: 2025-05-15 10:39:45.426 [INFO][4200] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliea29d83d590 ContainerID="11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" Namespace="kube-system" Pod="coredns-668d6bf9bc-cjkpq" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" May 15 10:39:45.442147 env[1217]: 2025-05-15 10:39:45.430 [INFO][4200] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" Namespace="kube-system" Pod="coredns-668d6bf9bc-cjkpq" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" May 15 10:39:45.442147 env[1217]: 2025-05-15 10:39:45.430 [INFO][4200] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" Namespace="kube-system" Pod="coredns-668d6bf9bc-cjkpq" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"78023a57-4294-4669-bd3b-842d5d20e076", ResourceVersion:"1019", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb", Pod:"coredns-668d6bf9bc-cjkpq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliea29d83d590", MAC:"c6:73:0e:15:fb:71", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:45.442147 env[1217]: 2025-05-15 10:39:45.439 [INFO][4200] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb" Namespace="kube-system" Pod="coredns-668d6bf9bc-cjkpq" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" May 15 10:39:45.455000 audit[4234]: NETFILTER_CFG table=filter:115 family=2 entries=48 op=nft_register_chain pid=4234 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:45.455000 audit[4234]: SYSCALL arch=c000003e syscall=46 success=yes exit=23448 a0=3 a1=7ffdf51e28b0 a2=0 a3=7ffdf51e289c items=0 ppid=3297 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.455000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:45.487757 kubelet[1951]: I0515 10:39:45.487691 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-c6767cb7f-vt2wp" podStartSLOduration=42.487670484 podStartE2EDuration="42.487670484s" podCreationTimestamp="2025-05-15 10:39:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:39:45.487639546 +0000 UTC m=+55.717117364" watchObservedRunningTime="2025-05-15 10:39:45.487670484 +0000 UTC m=+55.717148302" May 15 10:39:45.504000 audit[4263]: NETFILTER_CFG table=filter:116 family=2 entries=10 op=nft_register_rule pid=4263 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:45.504000 audit[4263]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffde61c4610 a2=0 a3=7ffde61c45fc items=0 ppid=2102 pid=4263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.504000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:45.509337 env[1217]: time="2025-05-15T10:39:45.504017820Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:45.509453 env[1217]: time="2025-05-15T10:39:45.509394379Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:45.509453 env[1217]: time="2025-05-15T10:39:45.509429314Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:45.509701 env[1217]: time="2025-05-15T10:39:45.509667712Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb pid=4254 runtime=io.containerd.runc.v2 May 15 10:39:45.510000 audit[4263]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=4263 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:45.510000 audit[4263]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffde61c4610 a2=0 a3=7ffde61c45fc items=0 ppid=2102 pid=4263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:45.547499 systemd[1]: Started cri-containerd-11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb.scope. May 15 10:39:45.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit: BPF prog-id=189 op=LOAD May 15 10:39:45.562000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4254 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131633462363439653261653036383065636463373563356562666461 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4254 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131633462363439653261653036383065636463373563356562666461 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit: BPF prog-id=190 op=LOAD May 15 10:39:45.562000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000289350 items=0 ppid=4254 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131633462363439653261653036383065636463373563356562666461 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.562000 audit: BPF prog-id=191 op=LOAD May 15 10:39:45.562000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000289398 items=0 ppid=4254 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131633462363439653261653036383065636463373563356562666461 May 15 10:39:45.562000 audit: BPF prog-id=191 op=UNLOAD May 15 10:39:45.562000 audit: BPF prog-id=190 op=UNLOAD May 15 10:39:45.563000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.563000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.563000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.563000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.563000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.563000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.563000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.563000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.563000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.563000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.563000 audit: BPF prog-id=192 op=LOAD May 15 10:39:45.563000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002897a8 items=0 ppid=4254 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131633462363439653261653036383065636463373563356562666461 May 15 10:39:45.565020 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:39:45.601218 sshd[4221]: pam_unix(sshd:session): session closed for user core May 15 10:39:45.602000 audit[4221]: USER_END pid=4221 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:45.602000 audit[4221]: CRED_DISP pid=4221 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:45.604649 systemd[1]: sshd@14-10.0.0.52:22-10.0.0.1:43930.service: Deactivated successfully. May 15 10:39:45.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.52:22-10.0.0.1:43930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:45.605494 systemd[1]: session-15.scope: Deactivated successfully. May 15 10:39:45.606135 systemd-logind[1201]: Session 15 logged out. Waiting for processes to exit. May 15 10:39:45.607151 systemd-logind[1201]: Removed session 15. May 15 10:39:45.620672 env[1217]: time="2025-05-15T10:39:45.620619888Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-cjkpq,Uid:78023a57-4294-4669-bd3b-842d5d20e076,Namespace:kube-system,Attempt:1,} returns sandbox id \"11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb\"" May 15 10:39:45.622277 kubelet[1951]: E0515 10:39:45.621759 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:45.624221 env[1217]: time="2025-05-15T10:39:45.624155543Z" level=info msg="CreateContainer within sandbox \"11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:39:45.731000 audit[4148]: AVC avc: denied { watch } for pid=4148 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_39_19.4203714634/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c982 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c982 tclass=file permissive=0 May 15 10:39:45.731000 audit[4148]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000acbec0 a2=fc6 a3=0 items=0 ppid=4091 pid=4148 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c982 key=(null) May 15 10:39:45.731000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:39:45.848275 env[1217]: time="2025-05-15T10:39:45.848234114Z" level=info msg="StopPodSandbox for \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\"" May 15 10:39:46.033732 env[1217]: time="2025-05-15T10:39:46.033674648Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:46.040000 audit[4329]: NETFILTER_CFG table=filter:118 family=2 entries=9 op=nft_register_rule pid=4329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:46.040000 audit[4329]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc6c757960 a2=0 a3=7ffc6c75794c items=0 ppid=2102 pid=4329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.040000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:46.051000 audit[4329]: NETFILTER_CFG table=nat:119 family=2 entries=27 op=nft_register_chain pid=4329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:46.051000 audit[4329]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc6c757960 a2=0 a3=7ffc6c75794c items=0 ppid=2102 pid=4329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:46.052782 env[1217]: time="2025-05-15T10:39:46.052724504Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:46.059223 env[1217]: time="2025-05-15T10:39:46.059164128Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:46.063398 env[1217]: time="2025-05-15T10:39:46.063313365Z" level=info msg="CreateContainer within sandbox \"11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"247b56f9830fb04fe8414d6ef8c69798855397661c59b9fc7e9ec68258f057f0\"" May 15 10:39:46.063963 env[1217]: time="2025-05-15T10:39:46.063936614Z" level=info msg="StartContainer for \"247b56f9830fb04fe8414d6ef8c69798855397661c59b9fc7e9ec68258f057f0\"" May 15 10:39:46.064462 env[1217]: time="2025-05-15T10:39:46.064425200Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:46.064696 env[1217]: time="2025-05-15T10:39:46.064665171Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 10:39:46.066747 env[1217]: time="2025-05-15T10:39:46.066710819Z" level=info msg="CreateContainer within sandbox \"3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 10:39:46.098934 systemd[1]: Started cri-containerd-247b56f9830fb04fe8414d6ef8c69798855397661c59b9fc7e9ec68258f057f0.scope. May 15 10:39:46.104470 env[1217]: time="2025-05-15T10:39:46.104428586Z" level=info msg="CreateContainer within sandbox \"3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"79f1ca0050d44344fdbe0f6e688673d8a47a076032c9330ddf03a6e761b544e1\"" May 15 10:39:46.105824 env[1217]: time="2025-05-15T10:39:46.105413474Z" level=info msg="StartContainer for \"79f1ca0050d44344fdbe0f6e688673d8a47a076032c9330ddf03a6e761b544e1\"" May 15 10:39:46.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.117000 audit: BPF prog-id=193 op=LOAD May 15 10:39:46.118808 env[1217]: 2025-05-15 10:39:46.024 [INFO][4315] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" May 15 10:39:46.118808 env[1217]: 2025-05-15 10:39:46.025 [INFO][4315] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" iface="eth0" netns="/var/run/netns/cni-cd9daf7f-8413-04d4-6907-8e98db5551a7" May 15 10:39:46.118808 env[1217]: 2025-05-15 10:39:46.026 [INFO][4315] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" iface="eth0" netns="/var/run/netns/cni-cd9daf7f-8413-04d4-6907-8e98db5551a7" May 15 10:39:46.118808 env[1217]: 2025-05-15 10:39:46.026 [INFO][4315] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" iface="eth0" netns="/var/run/netns/cni-cd9daf7f-8413-04d4-6907-8e98db5551a7" May 15 10:39:46.118808 env[1217]: 2025-05-15 10:39:46.026 [INFO][4315] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" May 15 10:39:46.118808 env[1217]: 2025-05-15 10:39:46.027 [INFO][4315] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" May 15 10:39:46.118808 env[1217]: 2025-05-15 10:39:46.059 [INFO][4323] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" HandleID="k8s-pod-network.fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" Workload="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" May 15 10:39:46.118808 env[1217]: 2025-05-15 10:39:46.060 [INFO][4323] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:46.118808 env[1217]: 2025-05-15 10:39:46.060 [INFO][4323] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:46.118808 env[1217]: 2025-05-15 10:39:46.086 [WARNING][4323] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" HandleID="k8s-pod-network.fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" Workload="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" May 15 10:39:46.118808 env[1217]: 2025-05-15 10:39:46.086 [INFO][4323] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" HandleID="k8s-pod-network.fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" Workload="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" May 15 10:39:46.118808 env[1217]: 2025-05-15 10:39:46.089 [INFO][4323] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:46.118808 env[1217]: 2025-05-15 10:39:46.096 [INFO][4315] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" May 15 10:39:46.118808 env[1217]: time="2025-05-15T10:39:46.117402682Z" level=info msg="TearDown network for sandbox \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\" successfully" May 15 10:39:46.118808 env[1217]: time="2025-05-15T10:39:46.117436164Z" level=info msg="StopPodSandbox for \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\" returns successfully" May 15 10:39:46.118808 env[1217]: time="2025-05-15T10:39:46.118047272Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55d6dc944c-d6zgh,Uid:ad701ce2-5ac1-471a-bae9-111eca92acb6,Namespace:calico-system,Attempt:1,}" May 15 10:39:46.119000 audit[4340]: AVC avc: denied { bpf } for pid=4340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.119000 audit[4340]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=4254 pid=4340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376235366639383330666230346665383431346436656638633639 May 15 10:39:46.119000 audit[4340]: AVC avc: denied { perfmon } for pid=4340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.119000 audit[4340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=4254 pid=4340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376235366639383330666230346665383431346436656638633639 May 15 10:39:46.119000 audit[4340]: AVC avc: denied { bpf } for pid=4340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.119000 audit[4340]: AVC avc: denied { bpf } for pid=4340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.119000 audit[4340]: AVC avc: denied { bpf } for pid=4340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.119000 audit[4340]: AVC avc: denied { perfmon } for pid=4340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.119000 audit[4340]: AVC avc: denied { perfmon } for pid=4340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.119000 audit[4340]: AVC avc: denied { perfmon } for pid=4340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.119000 audit[4340]: AVC avc: denied { perfmon } for pid=4340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.119000 audit[4340]: AVC avc: denied { perfmon } for pid=4340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.119000 audit[4340]: AVC avc: denied { bpf } for pid=4340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.119000 audit[4340]: AVC avc: denied { bpf } for pid=4340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.119000 audit: BPF prog-id=194 op=LOAD May 15 10:39:46.119000 audit[4340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c0002c5e10 items=0 ppid=4254 pid=4340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376235366639383330666230346665383431346436656638633639 May 15 10:39:46.120000 audit[4340]: AVC avc: denied { bpf } for pid=4340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.120000 audit[4340]: AVC avc: denied { bpf } for pid=4340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.120000 audit[4340]: AVC avc: denied { perfmon } for pid=4340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.120000 audit[4340]: AVC avc: denied { perfmon } for pid=4340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.120000 audit[4340]: AVC avc: denied { perfmon } for pid=4340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.120000 audit[4340]: AVC avc: denied { perfmon } for pid=4340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.120000 audit[4340]: AVC avc: denied { perfmon } for pid=4340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.120000 audit[4340]: AVC avc: denied { bpf } for pid=4340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.120000 audit[4340]: AVC avc: denied { bpf } for pid=4340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.120000 audit: BPF prog-id=195 op=LOAD May 15 10:39:46.120000 audit[4340]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c0002c5e58 items=0 ppid=4254 pid=4340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376235366639383330666230346665383431346436656638633639 May 15 10:39:46.121000 audit: BPF prog-id=195 op=UNLOAD May 15 10:39:46.121000 audit: BPF prog-id=194 op=UNLOAD May 15 10:39:46.121000 audit[4340]: AVC avc: denied { bpf } for pid=4340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.121000 audit[4340]: AVC avc: denied { bpf } for pid=4340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.121000 audit[4340]: AVC avc: denied { bpf } for pid=4340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.121000 audit[4340]: AVC avc: denied { perfmon } for pid=4340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.121000 audit[4340]: AVC avc: denied { perfmon } for pid=4340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.121000 audit[4340]: AVC avc: denied { perfmon } for pid=4340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.121000 audit[4340]: AVC avc: denied { perfmon } for pid=4340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.121000 audit[4340]: AVC avc: denied { perfmon } for pid=4340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.121000 audit[4340]: AVC avc: denied { bpf } for pid=4340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.121000 audit[4340]: AVC avc: denied { bpf } for pid=4340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.121000 audit: BPF prog-id=196 op=LOAD May 15 10:39:46.121000 audit[4340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c000386268 items=0 ppid=4254 pid=4340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376235366639383330666230346665383431346436656638633639 May 15 10:39:46.142544 env[1217]: time="2025-05-15T10:39:46.142484999Z" level=info msg="StartContainer for \"247b56f9830fb04fe8414d6ef8c69798855397661c59b9fc7e9ec68258f057f0\" returns successfully" May 15 10:39:46.149398 systemd[1]: Started cri-containerd-79f1ca0050d44344fdbe0f6e688673d8a47a076032c9330ddf03a6e761b544e1.scope. May 15 10:39:46.158000 audit[4356]: AVC avc: denied { getattr } for pid=4356 comm="coredns" path="cgroup:[4026532497]" dev="nsfs" ino=4026532497 scontext=system_u:system_r:svirt_lxc_net_t:s0:c500,c829 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 15 10:39:46.158000 audit[4356]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c0000e26a8 a2=c0000c1d78 a3=0 items=0 ppid=4254 pid=4356 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c500,c829 key=(null) May 15 10:39:46.158000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f5a4851ae18 items=0 ppid=3827 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739663163613030353064343433343466646265306636653638383637 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit: BPF prog-id=197 op=LOAD May 15 10:39:46.188000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000098ee8 items=0 ppid=3827 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739663163613030353064343433343466646265306636653638383637 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit: BPF prog-id=198 op=LOAD May 15 10:39:46.188000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000098f38 items=0 ppid=3827 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739663163613030353064343433343466646265306636653638383637 May 15 10:39:46.188000 audit: BPF prog-id=198 op=UNLOAD May 15 10:39:46.188000 audit: BPF prog-id=197 op=UNLOAD May 15 10:39:46.188000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.188000 audit: BPF prog-id=199 op=LOAD May 15 10:39:46.188000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000098fc8 items=0 ppid=3827 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739663163613030353064343433343466646265306636653638383637 May 15 10:39:46.206780 env[1217]: time="2025-05-15T10:39:46.206720355Z" level=info msg="StartContainer for \"79f1ca0050d44344fdbe0f6e688673d8a47a076032c9330ddf03a6e761b544e1\" returns successfully" May 15 10:39:46.361939 systemd-networkd[1039]: calib5d62729c05: Link UP May 15 10:39:46.365874 systemd-networkd[1039]: calib5d62729c05: Gained carrier May 15 10:39:46.366496 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib5d62729c05: link becomes ready May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.182 [INFO][4389] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0 calico-kube-controllers-55d6dc944c- calico-system ad701ce2-5ac1-471a-bae9-111eca92acb6 1038 0 2025-05-15 10:39:03 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:55d6dc944c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-55d6dc944c-d6zgh eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calib5d62729c05 [] []}} ContainerID="db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" Namespace="calico-system" Pod="calico-kube-controllers-55d6dc944c-d6zgh" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-" May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.182 [INFO][4389] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" Namespace="calico-system" Pod="calico-kube-controllers-55d6dc944c-d6zgh" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.220 [INFO][4414] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" HandleID="k8s-pod-network.db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" Workload="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.327 [INFO][4414] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" HandleID="k8s-pod-network.db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" Workload="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00030b090), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-55d6dc944c-d6zgh", "timestamp":"2025-05-15 10:39:46.220275822 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.327 [INFO][4414] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.327 [INFO][4414] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.327 [INFO][4414] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.329 [INFO][4414] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" host="localhost" May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.332 [INFO][4414] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.336 [INFO][4414] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.338 [INFO][4414] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.340 [INFO][4414] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.340 [INFO][4414] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" host="localhost" May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.342 [INFO][4414] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594 May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.347 [INFO][4414] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" host="localhost" May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.355 [INFO][4414] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" host="localhost" May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.355 [INFO][4414] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" host="localhost" May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.355 [INFO][4414] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:46.377451 env[1217]: 2025-05-15 10:39:46.355 [INFO][4414] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" HandleID="k8s-pod-network.db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" Workload="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" May 15 10:39:46.378024 env[1217]: 2025-05-15 10:39:46.359 [INFO][4389] cni-plugin/k8s.go 386: Populated endpoint ContainerID="db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" Namespace="calico-system" Pod="calico-kube-controllers-55d6dc944c-d6zgh" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0", GenerateName:"calico-kube-controllers-55d6dc944c-", Namespace:"calico-system", SelfLink:"", UID:"ad701ce2-5ac1-471a-bae9-111eca92acb6", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55d6dc944c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-55d6dc944c-d6zgh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib5d62729c05", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:46.378024 env[1217]: 2025-05-15 10:39:46.359 [INFO][4389] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" Namespace="calico-system" Pod="calico-kube-controllers-55d6dc944c-d6zgh" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" May 15 10:39:46.378024 env[1217]: 2025-05-15 10:39:46.360 [INFO][4389] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib5d62729c05 ContainerID="db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" Namespace="calico-system" Pod="calico-kube-controllers-55d6dc944c-d6zgh" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" May 15 10:39:46.378024 env[1217]: 2025-05-15 10:39:46.362 [INFO][4389] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" Namespace="calico-system" Pod="calico-kube-controllers-55d6dc944c-d6zgh" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" May 15 10:39:46.378024 env[1217]: 2025-05-15 10:39:46.363 [INFO][4389] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" Namespace="calico-system" Pod="calico-kube-controllers-55d6dc944c-d6zgh" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0", GenerateName:"calico-kube-controllers-55d6dc944c-", Namespace:"calico-system", SelfLink:"", UID:"ad701ce2-5ac1-471a-bae9-111eca92acb6", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55d6dc944c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594", Pod:"calico-kube-controllers-55d6dc944c-d6zgh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib5d62729c05", MAC:"d2:4b:1d:8e:dd:c2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:46.378024 env[1217]: 2025-05-15 10:39:46.373 [INFO][4389] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594" Namespace="calico-system" Pod="calico-kube-controllers-55d6dc944c-d6zgh" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" May 15 10:39:46.384000 audit[4450]: NETFILTER_CFG table=filter:120 family=2 entries=46 op=nft_register_chain pid=4450 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:46.384000 audit[4450]: SYSCALL arch=c000003e syscall=46 success=yes exit=22188 a0=3 a1=7ffe3ba85060 a2=0 a3=7ffe3ba8504c items=0 ppid=3297 pid=4450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.384000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:46.390475 env[1217]: time="2025-05-15T10:39:46.390414875Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:46.390557 env[1217]: time="2025-05-15T10:39:46.390461693Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:46.390557 env[1217]: time="2025-05-15T10:39:46.390471732Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:46.390708 env[1217]: time="2025-05-15T10:39:46.390662449Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594 pid=4457 runtime=io.containerd.runc.v2 May 15 10:39:46.404656 systemd[1]: Started cri-containerd-db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594.scope. May 15 10:39:46.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit: BPF prog-id=200 op=LOAD May 15 10:39:46.417000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[4467]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4457 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462333634663030353766386264653536326332306564316365393265 May 15 10:39:46.417000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[4467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4457 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462333634663030353766386264653536326332306564316365393265 May 15 10:39:46.417000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.417000 audit: BPF prog-id=201 op=LOAD May 15 10:39:46.417000 audit[4467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002234f0 items=0 ppid=4457 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462333634663030353766386264653536326332306564316365393265 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit: BPF prog-id=202 op=LOAD May 15 10:39:46.418000 audit[4467]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000223538 items=0 ppid=4457 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462333634663030353766386264653536326332306564316365393265 May 15 10:39:46.418000 audit: BPF prog-id=202 op=UNLOAD May 15 10:39:46.418000 audit: BPF prog-id=201 op=UNLOAD May 15 10:39:46.418000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.418000 audit: BPF prog-id=203 op=LOAD May 15 10:39:46.418000 audit[4467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000223948 items=0 ppid=4457 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462333634663030353766386264653536326332306564316365393265 May 15 10:39:46.419356 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:39:46.442936 env[1217]: time="2025-05-15T10:39:46.442883191Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55d6dc944c-d6zgh,Uid:ad701ce2-5ac1-471a-bae9-111eca92acb6,Namespace:calico-system,Attempt:1,} returns sandbox id \"db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594\"" May 15 10:39:46.444616 env[1217]: time="2025-05-15T10:39:46.444571920Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 15 10:39:46.474722 kubelet[1951]: E0515 10:39:46.474574 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:46.485159 kubelet[1951]: I0515 10:39:46.485082 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-cjkpq" podStartSLOduration=51.485064604 podStartE2EDuration="51.485064604s" podCreationTimestamp="2025-05-15 10:38:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:39:46.48472697 +0000 UTC m=+56.714204788" watchObservedRunningTime="2025-05-15 10:39:46.485064604 +0000 UTC m=+56.714542412" May 15 10:39:46.505644 kubelet[1951]: I0515 10:39:46.505576 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-b7nq8" podStartSLOduration=33.627103079 podStartE2EDuration="43.505557058s" podCreationTimestamp="2025-05-15 10:39:03 +0000 UTC" firstStartedPulling="2025-05-15 10:39:36.18711112 +0000 UTC m=+46.416588928" lastFinishedPulling="2025-05-15 10:39:46.065565099 +0000 UTC m=+56.295042907" observedRunningTime="2025-05-15 10:39:46.504692916 +0000 UTC m=+56.734170724" watchObservedRunningTime="2025-05-15 10:39:46.505557058 +0000 UTC m=+56.735034876" May 15 10:39:46.506000 audit[4492]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=4492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:46.506000 audit[4492]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffca8199a00 a2=0 a3=7ffca81999ec items=0 ppid=2102 pid=4492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.506000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:46.516640 systemd-networkd[1039]: caliea29d83d590: Gained IPv6LL May 15 10:39:46.521000 audit[4492]: NETFILTER_CFG table=nat:122 family=2 entries=58 op=nft_register_chain pid=4492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:46.521000 audit[4492]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7ffca8199a00 a2=0 a3=7ffca81999ec items=0 ppid=2102 pid=4492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:46.743000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:46.743000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0015cd860 a2=fc6 a3=0 items=0 ppid=1682 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 key=(null) May 15 10:39:46.743000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:46.743000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:46.743000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bcede0 a2=fc6 a3=0 items=0 ppid=1682 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 key=(null) May 15 10:39:46.743000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:46.913068 kubelet[1951]: I0515 10:39:46.913026 1951 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 10:39:46.913068 kubelet[1951]: I0515 10:39:46.913067 1951 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 10:39:47.047719 systemd[1]: run-netns-cni\x2dcd9daf7f\x2d8413\x2d04d4\x2d6907\x2d8e98db5551a7.mount: Deactivated successfully. May 15 10:39:47.074000 audit[1793]: AVC avc: denied { watch } for pid=1793 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:47.074000 audit[1793]: AVC avc: denied { watch } for pid=1793 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:47.074000 audit[1793]: AVC avc: denied { watch } for pid=1793 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:47.074000 audit[1793]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00858acf0 a2=fc6 a3=0 items=0 ppid=1653 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 key=(null) May 15 10:39:47.074000 audit[1793]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c004a238c0 a2=fc6 a3=0 items=0 ppid=1653 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 key=(null) May 15 10:39:47.074000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3532002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:47.074000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3532002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:47.074000 audit[1793]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00415f000 a2=fc6 a3=0 items=0 ppid=1653 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 key=(null) May 15 10:39:47.074000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3532002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:47.078000 audit[1793]: AVC avc: denied { watch } for pid=1793 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:47.078000 audit[1793]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00675e870 a2=fc6 a3=0 items=0 ppid=1653 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 key=(null) May 15 10:39:47.078000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3532002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:47.082000 audit[1793]: AVC avc: denied { watch } for pid=1793 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:47.082000 audit[1793]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00ef80fe0 a2=fc6 a3=0 items=0 ppid=1653 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 key=(null) May 15 10:39:47.082000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3532002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:47.083000 audit[1793]: AVC avc: denied { watch } for pid=1793 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:47.083000 audit[1793]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00675e930 a2=fc6 a3=0 items=0 ppid=1653 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c953 key=(null) May 15 10:39:47.083000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3532002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:47.481963 kubelet[1951]: E0515 10:39:47.481926 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:47.541673 systemd-networkd[1039]: calib5d62729c05: Gained IPv6LL May 15 10:39:49.084675 env[1217]: time="2025-05-15T10:39:49.084607522Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:49.146845 env[1217]: time="2025-05-15T10:39:49.146791381Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:49.159972 env[1217]: time="2025-05-15T10:39:49.159901960Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:49.162087 env[1217]: time="2025-05-15T10:39:49.162034481Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:49.162779 env[1217]: time="2025-05-15T10:39:49.162739154Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 15 10:39:49.170935 env[1217]: time="2025-05-15T10:39:49.170905357Z" level=info msg="CreateContainer within sandbox \"db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 15 10:39:49.183627 env[1217]: time="2025-05-15T10:39:49.183561424Z" level=info msg="CreateContainer within sandbox \"db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"85c9231797efea3a8c72ac3736bc49b4c169391eead47167d50a25db2a0b64d6\"" May 15 10:39:49.184154 env[1217]: time="2025-05-15T10:39:49.184098742Z" level=info msg="StartContainer for \"85c9231797efea3a8c72ac3736bc49b4c169391eead47167d50a25db2a0b64d6\"" May 15 10:39:49.198926 systemd[1]: Started cri-containerd-85c9231797efea3a8c72ac3736bc49b4c169391eead47167d50a25db2a0b64d6.scope. May 15 10:39:49.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit: BPF prog-id=204 op=LOAD May 15 10:39:49.213000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4457 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:49.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835633932333137393765666561336138633732616333373336626334 May 15 10:39:49.213000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4457 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:49.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835633932333137393765666561336138633732616333373336626334 May 15 10:39:49.213000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.213000 audit: BPF prog-id=205 op=LOAD May 15 10:39:49.213000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000359d10 items=0 ppid=4457 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:49.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835633932333137393765666561336138633732616333373336626334 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit: BPF prog-id=206 op=LOAD May 15 10:39:49.214000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000359d58 items=0 ppid=4457 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:49.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835633932333137393765666561336138633732616333373336626334 May 15 10:39:49.214000 audit: BPF prog-id=206 op=UNLOAD May 15 10:39:49.214000 audit: BPF prog-id=205 op=UNLOAD May 15 10:39:49.214000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.214000 audit: BPF prog-id=207 op=LOAD May 15 10:39:49.214000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d0168 items=0 ppid=4457 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:49.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835633932333137393765666561336138633732616333373336626334 May 15 10:39:49.518478 env[1217]: time="2025-05-15T10:39:49.518420867Z" level=info msg="StartContainer for \"85c9231797efea3a8c72ac3736bc49b4c169391eead47167d50a25db2a0b64d6\" returns successfully" May 15 10:39:49.844401 env[1217]: time="2025-05-15T10:39:49.844239546Z" level=info msg="StopPodSandbox for \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\"" May 15 10:39:49.912351 env[1217]: 2025-05-15 10:39:49.878 [WARNING][4545] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"78023a57-4294-4669-bd3b-842d5d20e076", ResourceVersion:"1067", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb", Pod:"coredns-668d6bf9bc-cjkpq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliea29d83d590", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:49.912351 env[1217]: 2025-05-15 10:39:49.878 [INFO][4545] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" May 15 10:39:49.912351 env[1217]: 2025-05-15 10:39:49.878 [INFO][4545] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" iface="eth0" netns="" May 15 10:39:49.912351 env[1217]: 2025-05-15 10:39:49.878 [INFO][4545] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" May 15 10:39:49.912351 env[1217]: 2025-05-15 10:39:49.878 [INFO][4545] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" May 15 10:39:49.912351 env[1217]: 2025-05-15 10:39:49.900 [INFO][4555] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" HandleID="k8s-pod-network.9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" Workload="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" May 15 10:39:49.912351 env[1217]: 2025-05-15 10:39:49.900 [INFO][4555] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:49.912351 env[1217]: 2025-05-15 10:39:49.900 [INFO][4555] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:49.912351 env[1217]: 2025-05-15 10:39:49.906 [WARNING][4555] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" HandleID="k8s-pod-network.9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" Workload="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" May 15 10:39:49.912351 env[1217]: 2025-05-15 10:39:49.906 [INFO][4555] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" HandleID="k8s-pod-network.9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" Workload="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" May 15 10:39:49.912351 env[1217]: 2025-05-15 10:39:49.908 [INFO][4555] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:49.912351 env[1217]: 2025-05-15 10:39:49.910 [INFO][4545] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" May 15 10:39:49.912888 env[1217]: time="2025-05-15T10:39:49.912388187Z" level=info msg="TearDown network for sandbox \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\" successfully" May 15 10:39:49.912888 env[1217]: time="2025-05-15T10:39:49.912427360Z" level=info msg="StopPodSandbox for \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\" returns successfully" May 15 10:39:49.913726 env[1217]: time="2025-05-15T10:39:49.913685571Z" level=info msg="RemovePodSandbox for \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\"" May 15 10:39:49.913799 env[1217]: time="2025-05-15T10:39:49.913733461Z" level=info msg="Forcibly stopping sandbox \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\"" May 15 10:39:49.979190 env[1217]: 2025-05-15 10:39:49.948 [WARNING][4577] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"78023a57-4294-4669-bd3b-842d5d20e076", ResourceVersion:"1067", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"11c4b649e2ae0680ecdc75c5ebfda25a82278902fecd86066c0157e5fb56f5cb", Pod:"coredns-668d6bf9bc-cjkpq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliea29d83d590", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:49.979190 env[1217]: 2025-05-15 10:39:49.948 [INFO][4577] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" May 15 10:39:49.979190 env[1217]: 2025-05-15 10:39:49.948 [INFO][4577] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" iface="eth0" netns="" May 15 10:39:49.979190 env[1217]: 2025-05-15 10:39:49.948 [INFO][4577] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" May 15 10:39:49.979190 env[1217]: 2025-05-15 10:39:49.948 [INFO][4577] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" May 15 10:39:49.979190 env[1217]: 2025-05-15 10:39:49.967 [INFO][4585] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" HandleID="k8s-pod-network.9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" Workload="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" May 15 10:39:49.979190 env[1217]: 2025-05-15 10:39:49.967 [INFO][4585] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:49.979190 env[1217]: 2025-05-15 10:39:49.967 [INFO][4585] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:49.979190 env[1217]: 2025-05-15 10:39:49.974 [WARNING][4585] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" HandleID="k8s-pod-network.9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" Workload="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" May 15 10:39:49.979190 env[1217]: 2025-05-15 10:39:49.974 [INFO][4585] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" HandleID="k8s-pod-network.9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" Workload="localhost-k8s-coredns--668d6bf9bc--cjkpq-eth0" May 15 10:39:49.979190 env[1217]: 2025-05-15 10:39:49.975 [INFO][4585] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:49.979190 env[1217]: 2025-05-15 10:39:49.977 [INFO][4577] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3" May 15 10:39:49.979673 env[1217]: time="2025-05-15T10:39:49.979220778Z" level=info msg="TearDown network for sandbox \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\" successfully" May 15 10:39:50.028766 env[1217]: time="2025-05-15T10:39:50.028699035Z" level=info msg="RemovePodSandbox \"9c335c2d29f96a394f2fb499f47284ed5ea581d279ad7e129b4f5f012ff1ddc3\" returns successfully" May 15 10:39:50.029360 env[1217]: time="2025-05-15T10:39:50.029316544Z" level=info msg="StopPodSandbox for \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\"" May 15 10:39:50.197972 env[1217]: 2025-05-15 10:39:50.119 [WARNING][4608] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--nknfx-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"c26a27ad-f260-4d01-a93f-c6cf02296653", ResourceVersion:"963", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751", Pod:"coredns-668d6bf9bc-nknfx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2edb58d86d2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:50.197972 env[1217]: 2025-05-15 10:39:50.119 [INFO][4608] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" May 15 10:39:50.197972 env[1217]: 2025-05-15 10:39:50.119 [INFO][4608] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" iface="eth0" netns="" May 15 10:39:50.197972 env[1217]: 2025-05-15 10:39:50.119 [INFO][4608] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" May 15 10:39:50.197972 env[1217]: 2025-05-15 10:39:50.119 [INFO][4608] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" May 15 10:39:50.197972 env[1217]: 2025-05-15 10:39:50.139 [INFO][4616] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" HandleID="k8s-pod-network.90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" Workload="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" May 15 10:39:50.197972 env[1217]: 2025-05-15 10:39:50.139 [INFO][4616] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:50.197972 env[1217]: 2025-05-15 10:39:50.139 [INFO][4616] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:50.197972 env[1217]: 2025-05-15 10:39:50.192 [WARNING][4616] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" HandleID="k8s-pod-network.90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" Workload="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" May 15 10:39:50.197972 env[1217]: 2025-05-15 10:39:50.193 [INFO][4616] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" HandleID="k8s-pod-network.90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" Workload="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" May 15 10:39:50.197972 env[1217]: 2025-05-15 10:39:50.194 [INFO][4616] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:50.197972 env[1217]: 2025-05-15 10:39:50.196 [INFO][4608] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" May 15 10:39:50.198798 env[1217]: time="2025-05-15T10:39:50.198001409Z" level=info msg="TearDown network for sandbox \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\" successfully" May 15 10:39:50.198798 env[1217]: time="2025-05-15T10:39:50.198034321Z" level=info msg="StopPodSandbox for \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\" returns successfully" May 15 10:39:50.198798 env[1217]: time="2025-05-15T10:39:50.198528057Z" level=info msg="RemovePodSandbox for \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\"" May 15 10:39:50.198798 env[1217]: time="2025-05-15T10:39:50.198568853Z" level=info msg="Forcibly stopping sandbox \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\"" May 15 10:39:50.280805 env[1217]: 2025-05-15 10:39:50.252 [WARNING][4638] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--nknfx-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"c26a27ad-f260-4d01-a93f-c6cf02296653", ResourceVersion:"963", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"65ab0ef691355f0919a03b5380a409ea25fd3a04d59918e6c5fea51ff55d0751", Pod:"coredns-668d6bf9bc-nknfx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2edb58d86d2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:50.280805 env[1217]: 2025-05-15 10:39:50.252 [INFO][4638] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" May 15 10:39:50.280805 env[1217]: 2025-05-15 10:39:50.252 [INFO][4638] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" iface="eth0" netns="" May 15 10:39:50.280805 env[1217]: 2025-05-15 10:39:50.252 [INFO][4638] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" May 15 10:39:50.280805 env[1217]: 2025-05-15 10:39:50.252 [INFO][4638] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" May 15 10:39:50.280805 env[1217]: 2025-05-15 10:39:50.270 [INFO][4647] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" HandleID="k8s-pod-network.90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" Workload="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" May 15 10:39:50.280805 env[1217]: 2025-05-15 10:39:50.270 [INFO][4647] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:50.280805 env[1217]: 2025-05-15 10:39:50.270 [INFO][4647] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:50.280805 env[1217]: 2025-05-15 10:39:50.276 [WARNING][4647] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" HandleID="k8s-pod-network.90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" Workload="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" May 15 10:39:50.280805 env[1217]: 2025-05-15 10:39:50.276 [INFO][4647] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" HandleID="k8s-pod-network.90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" Workload="localhost-k8s-coredns--668d6bf9bc--nknfx-eth0" May 15 10:39:50.280805 env[1217]: 2025-05-15 10:39:50.277 [INFO][4647] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:50.280805 env[1217]: 2025-05-15 10:39:50.279 [INFO][4638] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41" May 15 10:39:50.281776 env[1217]: time="2025-05-15T10:39:50.280845239Z" level=info msg="TearDown network for sandbox \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\" successfully" May 15 10:39:50.304811 env[1217]: time="2025-05-15T10:39:50.304742608Z" level=info msg="RemovePodSandbox \"90477ff91502f9662b41e3f8667bbe3e2334d026315e0a9f276ecacc896c8c41\" returns successfully" May 15 10:39:50.305405 env[1217]: time="2025-05-15T10:39:50.305321926Z" level=info msg="StopPodSandbox for \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\"" May 15 10:39:50.379041 env[1217]: 2025-05-15 10:39:50.342 [WARNING][4670] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0", GenerateName:"calico-apiserver-c6767cb7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"486bd89b-05b8-49ca-8103-b4cb3d3a867d", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c6767cb7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855", Pod:"calico-apiserver-c6767cb7f-5grml", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1803b3a5012", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:50.379041 env[1217]: 2025-05-15 10:39:50.342 [INFO][4670] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" May 15 10:39:50.379041 env[1217]: 2025-05-15 10:39:50.342 [INFO][4670] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" iface="eth0" netns="" May 15 10:39:50.379041 env[1217]: 2025-05-15 10:39:50.342 [INFO][4670] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" May 15 10:39:50.379041 env[1217]: 2025-05-15 10:39:50.342 [INFO][4670] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" May 15 10:39:50.379041 env[1217]: 2025-05-15 10:39:50.368 [INFO][4678] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" HandleID="k8s-pod-network.6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" Workload="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" May 15 10:39:50.379041 env[1217]: 2025-05-15 10:39:50.368 [INFO][4678] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:50.379041 env[1217]: 2025-05-15 10:39:50.369 [INFO][4678] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:50.379041 env[1217]: 2025-05-15 10:39:50.375 [WARNING][4678] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" HandleID="k8s-pod-network.6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" Workload="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" May 15 10:39:50.379041 env[1217]: 2025-05-15 10:39:50.375 [INFO][4678] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" HandleID="k8s-pod-network.6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" Workload="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" May 15 10:39:50.379041 env[1217]: 2025-05-15 10:39:50.376 [INFO][4678] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:50.379041 env[1217]: 2025-05-15 10:39:50.377 [INFO][4670] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" May 15 10:39:50.379523 env[1217]: time="2025-05-15T10:39:50.379076252Z" level=info msg="TearDown network for sandbox \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\" successfully" May 15 10:39:50.379523 env[1217]: time="2025-05-15T10:39:50.379112590Z" level=info msg="StopPodSandbox for \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\" returns successfully" May 15 10:39:50.379656 env[1217]: time="2025-05-15T10:39:50.379613519Z" level=info msg="RemovePodSandbox for \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\"" May 15 10:39:50.379823 env[1217]: time="2025-05-15T10:39:50.379655217Z" level=info msg="Forcibly stopping sandbox \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\"" May 15 10:39:50.451001 env[1217]: 2025-05-15 10:39:50.421 [WARNING][4701] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0", GenerateName:"calico-apiserver-c6767cb7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"486bd89b-05b8-49ca-8103-b4cb3d3a867d", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c6767cb7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"58be056cff0a78cfc927531a6ff1f103ec1f21a3b6cc2c20f2afdb93b3ad0855", Pod:"calico-apiserver-c6767cb7f-5grml", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1803b3a5012", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:50.451001 env[1217]: 2025-05-15 10:39:50.421 [INFO][4701] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" May 15 10:39:50.451001 env[1217]: 2025-05-15 10:39:50.421 [INFO][4701] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" iface="eth0" netns="" May 15 10:39:50.451001 env[1217]: 2025-05-15 10:39:50.421 [INFO][4701] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" May 15 10:39:50.451001 env[1217]: 2025-05-15 10:39:50.421 [INFO][4701] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" May 15 10:39:50.451001 env[1217]: 2025-05-15 10:39:50.440 [INFO][4709] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" HandleID="k8s-pod-network.6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" Workload="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" May 15 10:39:50.451001 env[1217]: 2025-05-15 10:39:50.440 [INFO][4709] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:50.451001 env[1217]: 2025-05-15 10:39:50.441 [INFO][4709] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:50.451001 env[1217]: 2025-05-15 10:39:50.446 [WARNING][4709] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" HandleID="k8s-pod-network.6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" Workload="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" May 15 10:39:50.451001 env[1217]: 2025-05-15 10:39:50.446 [INFO][4709] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" HandleID="k8s-pod-network.6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" Workload="localhost-k8s-calico--apiserver--c6767cb7f--5grml-eth0" May 15 10:39:50.451001 env[1217]: 2025-05-15 10:39:50.448 [INFO][4709] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:50.451001 env[1217]: 2025-05-15 10:39:50.449 [INFO][4701] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e" May 15 10:39:50.451001 env[1217]: time="2025-05-15T10:39:50.450968033Z" level=info msg="TearDown network for sandbox \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\" successfully" May 15 10:39:50.479573 env[1217]: time="2025-05-15T10:39:50.479507191Z" level=info msg="RemovePodSandbox \"6db83f59af1f1b94d66288c12b6432046584cd593194d82276403917d766658e\" returns successfully" May 15 10:39:50.480091 env[1217]: time="2025-05-15T10:39:50.480032416Z" level=info msg="StopPodSandbox for \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\"" May 15 10:39:50.556677 systemd[1]: run-containerd-runc-k8s.io-85c9231797efea3a8c72ac3736bc49b4c169391eead47167d50a25db2a0b64d6-runc.4oLGdF.mount: Deactivated successfully. May 15 10:39:50.571000 env[1217]: 2025-05-15 10:39:50.511 [WARNING][4730] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--b7nq8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5de422bf-365e-4b7f-b2a7-451d003a44f6", ResourceVersion:"1071", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2", Pod:"csi-node-driver-b7nq8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie4f8f1b6be5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:50.571000 env[1217]: 2025-05-15 10:39:50.512 [INFO][4730] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" May 15 10:39:50.571000 env[1217]: 2025-05-15 10:39:50.512 [INFO][4730] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" iface="eth0" netns="" May 15 10:39:50.571000 env[1217]: 2025-05-15 10:39:50.512 [INFO][4730] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" May 15 10:39:50.571000 env[1217]: 2025-05-15 10:39:50.512 [INFO][4730] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" May 15 10:39:50.571000 env[1217]: 2025-05-15 10:39:50.540 [INFO][4738] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" HandleID="k8s-pod-network.57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" Workload="localhost-k8s-csi--node--driver--b7nq8-eth0" May 15 10:39:50.571000 env[1217]: 2025-05-15 10:39:50.541 [INFO][4738] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:50.571000 env[1217]: 2025-05-15 10:39:50.541 [INFO][4738] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:50.571000 env[1217]: 2025-05-15 10:39:50.564 [WARNING][4738] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" HandleID="k8s-pod-network.57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" Workload="localhost-k8s-csi--node--driver--b7nq8-eth0" May 15 10:39:50.571000 env[1217]: 2025-05-15 10:39:50.564 [INFO][4738] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" HandleID="k8s-pod-network.57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" Workload="localhost-k8s-csi--node--driver--b7nq8-eth0" May 15 10:39:50.571000 env[1217]: 2025-05-15 10:39:50.567 [INFO][4738] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:50.571000 env[1217]: 2025-05-15 10:39:50.569 [INFO][4730] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" May 15 10:39:50.572041 env[1217]: time="2025-05-15T10:39:50.571027541Z" level=info msg="TearDown network for sandbox \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\" successfully" May 15 10:39:50.572041 env[1217]: time="2025-05-15T10:39:50.571059281Z" level=info msg="StopPodSandbox for \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\" returns successfully" May 15 10:39:50.572041 env[1217]: time="2025-05-15T10:39:50.571605747Z" level=info msg="RemovePodSandbox for \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\"" May 15 10:39:50.572041 env[1217]: time="2025-05-15T10:39:50.571643537Z" level=info msg="Forcibly stopping sandbox \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\"" May 15 10:39:50.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.52:22-10.0.0.1:43934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:50.605595 systemd[1]: Started sshd@15-10.0.0.52:22-10.0.0.1:43934.service. May 15 10:39:50.606729 kernel: kauditd_printk_skb: 383 callbacks suppressed May 15 10:39:50.606777 kernel: audit: type=1130 audit(1747305590.605:1426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.52:22-10.0.0.1:43934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:50.647000 audit[4788]: USER_ACCT pid=4788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:50.647744 sshd[4788]: Accepted publickey for core from 10.0.0.1 port 43934 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:50.651000 audit[4788]: CRED_ACQ pid=4788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:50.652243 sshd[4788]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:50.652447 kernel: audit: type=1101 audit(1747305590.647:1427): pid=4788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:50.652475 kernel: audit: type=1103 audit(1747305590.651:1428): pid=4788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:50.656418 systemd-logind[1201]: New session 16 of user core. May 15 10:39:50.657021 systemd[1]: Started session-16.scope. May 15 10:39:50.657867 kernel: audit: type=1006 audit(1747305590.651:1429): pid=4788 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 15 10:39:50.657925 kernel: audit: type=1300 audit(1747305590.651:1429): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd63e24d20 a2=3 a3=0 items=0 ppid=1 pid=4788 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.651000 audit[4788]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd63e24d20 a2=3 a3=0 items=0 ppid=1 pid=4788 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.662422 kernel: audit: type=1327 audit(1747305590.651:1429): proctitle=737368643A20636F7265205B707269765D May 15 10:39:50.651000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:50.663148 kernel: audit: type=1105 audit(1747305590.661:1430): pid=4788 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:50.661000 audit[4788]: USER_START pid=4788 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:50.663000 audit[4790]: CRED_ACQ pid=4790 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:50.671346 kernel: audit: type=1103 audit(1747305590.663:1431): pid=4790 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:50.703689 kubelet[1951]: I0515 10:39:50.702760 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-55d6dc944c-d6zgh" podStartSLOduration=44.983092272 podStartE2EDuration="47.702741106s" podCreationTimestamp="2025-05-15 10:39:03 +0000 UTC" firstStartedPulling="2025-05-15 10:39:46.444089254 +0000 UTC m=+56.673567072" lastFinishedPulling="2025-05-15 10:39:49.163738088 +0000 UTC m=+59.393215906" observedRunningTime="2025-05-15 10:39:50.567083671 +0000 UTC m=+60.796561480" watchObservedRunningTime="2025-05-15 10:39:50.702741106 +0000 UTC m=+60.932218924" May 15 10:39:50.742594 env[1217]: 2025-05-15 10:39:50.707 [WARNING][4775] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--b7nq8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5de422bf-365e-4b7f-b2a7-451d003a44f6", ResourceVersion:"1071", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3c57deb8df9234e79219fea4c00061daff828ec62ef56dc7473385087a4486e2", Pod:"csi-node-driver-b7nq8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie4f8f1b6be5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:50.742594 env[1217]: 2025-05-15 10:39:50.707 [INFO][4775] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" May 15 10:39:50.742594 env[1217]: 2025-05-15 10:39:50.707 [INFO][4775] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" iface="eth0" netns="" May 15 10:39:50.742594 env[1217]: 2025-05-15 10:39:50.707 [INFO][4775] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" May 15 10:39:50.742594 env[1217]: 2025-05-15 10:39:50.707 [INFO][4775] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" May 15 10:39:50.742594 env[1217]: 2025-05-15 10:39:50.732 [INFO][4795] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" HandleID="k8s-pod-network.57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" Workload="localhost-k8s-csi--node--driver--b7nq8-eth0" May 15 10:39:50.742594 env[1217]: 2025-05-15 10:39:50.732 [INFO][4795] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:50.742594 env[1217]: 2025-05-15 10:39:50.732 [INFO][4795] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:50.742594 env[1217]: 2025-05-15 10:39:50.737 [WARNING][4795] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" HandleID="k8s-pod-network.57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" Workload="localhost-k8s-csi--node--driver--b7nq8-eth0" May 15 10:39:50.742594 env[1217]: 2025-05-15 10:39:50.738 [INFO][4795] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" HandleID="k8s-pod-network.57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" Workload="localhost-k8s-csi--node--driver--b7nq8-eth0" May 15 10:39:50.742594 env[1217]: 2025-05-15 10:39:50.739 [INFO][4795] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:50.742594 env[1217]: 2025-05-15 10:39:50.741 [INFO][4775] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8" May 15 10:39:50.743065 env[1217]: time="2025-05-15T10:39:50.742647333Z" level=info msg="TearDown network for sandbox \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\" successfully" May 15 10:39:50.753772 env[1217]: time="2025-05-15T10:39:50.753700352Z" level=info msg="RemovePodSandbox \"57745a33eb93c915c25fa83838e3cb0321ee51b5bc45f8076001b862bd5484f8\" returns successfully" May 15 10:39:50.754349 env[1217]: time="2025-05-15T10:39:50.754290298Z" level=info msg="StopPodSandbox for \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\"" May 15 10:39:50.839282 env[1217]: 2025-05-15 10:39:50.798 [WARNING][4821] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0", GenerateName:"calico-kube-controllers-55d6dc944c-", Namespace:"calico-system", SelfLink:"", UID:"ad701ce2-5ac1-471a-bae9-111eca92acb6", ResourceVersion:"1105", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55d6dc944c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594", Pod:"calico-kube-controllers-55d6dc944c-d6zgh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib5d62729c05", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:50.839282 env[1217]: 2025-05-15 10:39:50.798 [INFO][4821] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" May 15 10:39:50.839282 env[1217]: 2025-05-15 10:39:50.798 [INFO][4821] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" iface="eth0" netns="" May 15 10:39:50.839282 env[1217]: 2025-05-15 10:39:50.798 [INFO][4821] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" May 15 10:39:50.839282 env[1217]: 2025-05-15 10:39:50.798 [INFO][4821] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" May 15 10:39:50.839282 env[1217]: 2025-05-15 10:39:50.824 [INFO][4832] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" HandleID="k8s-pod-network.fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" Workload="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" May 15 10:39:50.839282 env[1217]: 2025-05-15 10:39:50.825 [INFO][4832] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:50.839282 env[1217]: 2025-05-15 10:39:50.825 [INFO][4832] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:50.839282 env[1217]: 2025-05-15 10:39:50.831 [WARNING][4832] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" HandleID="k8s-pod-network.fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" Workload="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" May 15 10:39:50.839282 env[1217]: 2025-05-15 10:39:50.831 [INFO][4832] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" HandleID="k8s-pod-network.fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" Workload="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" May 15 10:39:50.839282 env[1217]: 2025-05-15 10:39:50.835 [INFO][4832] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:50.839282 env[1217]: 2025-05-15 10:39:50.837 [INFO][4821] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" May 15 10:39:50.840018 env[1217]: time="2025-05-15T10:39:50.839981552Z" level=info msg="TearDown network for sandbox \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\" successfully" May 15 10:39:50.840144 env[1217]: time="2025-05-15T10:39:50.840080487Z" level=info msg="StopPodSandbox for \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\" returns successfully" May 15 10:39:50.840707 env[1217]: time="2025-05-15T10:39:50.840670985Z" level=info msg="RemovePodSandbox for \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\"" May 15 10:39:50.840778 env[1217]: time="2025-05-15T10:39:50.840714767Z" level=info msg="Forcibly stopping sandbox \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\"" May 15 10:39:50.858681 sshd[4788]: pam_unix(sshd:session): session closed for user core May 15 10:39:50.868008 kernel: audit: type=1106 audit(1747305590.859:1432): pid=4788 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:50.868071 kernel: audit: type=1104 audit(1747305590.859:1433): pid=4788 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:50.859000 audit[4788]: USER_END pid=4788 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:50.859000 audit[4788]: CRED_DISP pid=4788 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:50.861583 systemd[1]: sshd@15-10.0.0.52:22-10.0.0.1:43934.service: Deactivated successfully. May 15 10:39:50.862527 systemd[1]: session-16.scope: Deactivated successfully. May 15 10:39:50.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.52:22-10.0.0.1:43934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:50.868479 systemd-logind[1201]: Session 16 logged out. Waiting for processes to exit. May 15 10:39:50.871989 systemd-logind[1201]: Removed session 16. May 15 10:39:50.910173 env[1217]: 2025-05-15 10:39:50.878 [WARNING][4854] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0", GenerateName:"calico-kube-controllers-55d6dc944c-", Namespace:"calico-system", SelfLink:"", UID:"ad701ce2-5ac1-471a-bae9-111eca92acb6", ResourceVersion:"1105", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55d6dc944c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"db364f0057f8bde562c20ed1ce92ec99b41ad38c16f07dc760159ce8c944c594", Pod:"calico-kube-controllers-55d6dc944c-d6zgh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib5d62729c05", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:50.910173 env[1217]: 2025-05-15 10:39:50.878 [INFO][4854] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" May 15 10:39:50.910173 env[1217]: 2025-05-15 10:39:50.878 [INFO][4854] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" iface="eth0" netns="" May 15 10:39:50.910173 env[1217]: 2025-05-15 10:39:50.878 [INFO][4854] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" May 15 10:39:50.910173 env[1217]: 2025-05-15 10:39:50.878 [INFO][4854] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" May 15 10:39:50.910173 env[1217]: 2025-05-15 10:39:50.897 [INFO][4864] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" HandleID="k8s-pod-network.fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" Workload="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" May 15 10:39:50.910173 env[1217]: 2025-05-15 10:39:50.897 [INFO][4864] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:50.910173 env[1217]: 2025-05-15 10:39:50.897 [INFO][4864] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:50.910173 env[1217]: 2025-05-15 10:39:50.905 [WARNING][4864] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" HandleID="k8s-pod-network.fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" Workload="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" May 15 10:39:50.910173 env[1217]: 2025-05-15 10:39:50.905 [INFO][4864] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" HandleID="k8s-pod-network.fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" Workload="localhost-k8s-calico--kube--controllers--55d6dc944c--d6zgh-eth0" May 15 10:39:50.910173 env[1217]: 2025-05-15 10:39:50.907 [INFO][4864] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:50.910173 env[1217]: 2025-05-15 10:39:50.908 [INFO][4854] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2" May 15 10:39:50.910667 env[1217]: time="2025-05-15T10:39:50.910226473Z" level=info msg="TearDown network for sandbox \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\" successfully" May 15 10:39:50.913493 env[1217]: time="2025-05-15T10:39:50.913466552Z" level=info msg="RemovePodSandbox \"fa68358e1cef6b9f8c142b63974cd3534f25dc1a6d2b3d8621fcaff23015c7e2\" returns successfully" May 15 10:39:50.914061 env[1217]: time="2025-05-15T10:39:50.914009841Z" level=info msg="StopPodSandbox for \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\"" May 15 10:39:50.976356 env[1217]: 2025-05-15 10:39:50.945 [WARNING][4886] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0", GenerateName:"calico-apiserver-c6767cb7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"d27729e0-fe3d-4ead-899b-fa0ef12160ff", ResourceVersion:"1039", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c6767cb7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0", Pod:"calico-apiserver-c6767cb7f-vt2wp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7def654836d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:50.976356 env[1217]: 2025-05-15 10:39:50.946 [INFO][4886] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" May 15 10:39:50.976356 env[1217]: 2025-05-15 10:39:50.946 [INFO][4886] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" iface="eth0" netns="" May 15 10:39:50.976356 env[1217]: 2025-05-15 10:39:50.946 [INFO][4886] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" May 15 10:39:50.976356 env[1217]: 2025-05-15 10:39:50.946 [INFO][4886] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" May 15 10:39:50.976356 env[1217]: 2025-05-15 10:39:50.963 [INFO][4894] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" HandleID="k8s-pod-network.6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" Workload="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" May 15 10:39:50.976356 env[1217]: 2025-05-15 10:39:50.964 [INFO][4894] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:50.976356 env[1217]: 2025-05-15 10:39:50.964 [INFO][4894] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:50.976356 env[1217]: 2025-05-15 10:39:50.970 [WARNING][4894] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" HandleID="k8s-pod-network.6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" Workload="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" May 15 10:39:50.976356 env[1217]: 2025-05-15 10:39:50.971 [INFO][4894] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" HandleID="k8s-pod-network.6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" Workload="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" May 15 10:39:50.976356 env[1217]: 2025-05-15 10:39:50.972 [INFO][4894] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:50.976356 env[1217]: 2025-05-15 10:39:50.974 [INFO][4886] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" May 15 10:39:50.976356 env[1217]: time="2025-05-15T10:39:50.976285159Z" level=info msg="TearDown network for sandbox \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\" successfully" May 15 10:39:50.976356 env[1217]: time="2025-05-15T10:39:50.976317590Z" level=info msg="StopPodSandbox for \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\" returns successfully" May 15 10:39:50.976869 env[1217]: time="2025-05-15T10:39:50.976808902Z" level=info msg="RemovePodSandbox for \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\"" May 15 10:39:50.976869 env[1217]: time="2025-05-15T10:39:50.976838418Z" level=info msg="Forcibly stopping sandbox \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\"" May 15 10:39:51.042783 env[1217]: 2025-05-15 10:39:51.011 [WARNING][4918] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0", GenerateName:"calico-apiserver-c6767cb7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"d27729e0-fe3d-4ead-899b-fa0ef12160ff", ResourceVersion:"1039", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c6767cb7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"264ef34f38987dd38909b30907919ba4ab5fc77ecce6ae4d0db378357c9c3be0", Pod:"calico-apiserver-c6767cb7f-vt2wp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7def654836d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:51.042783 env[1217]: 2025-05-15 10:39:51.012 [INFO][4918] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" May 15 10:39:51.042783 env[1217]: 2025-05-15 10:39:51.012 [INFO][4918] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" iface="eth0" netns="" May 15 10:39:51.042783 env[1217]: 2025-05-15 10:39:51.012 [INFO][4918] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" May 15 10:39:51.042783 env[1217]: 2025-05-15 10:39:51.012 [INFO][4918] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" May 15 10:39:51.042783 env[1217]: 2025-05-15 10:39:51.032 [INFO][4926] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" HandleID="k8s-pod-network.6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" Workload="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" May 15 10:39:51.042783 env[1217]: 2025-05-15 10:39:51.032 [INFO][4926] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:51.042783 env[1217]: 2025-05-15 10:39:51.032 [INFO][4926] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:51.042783 env[1217]: 2025-05-15 10:39:51.038 [WARNING][4926] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" HandleID="k8s-pod-network.6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" Workload="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" May 15 10:39:51.042783 env[1217]: 2025-05-15 10:39:51.038 [INFO][4926] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" HandleID="k8s-pod-network.6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" Workload="localhost-k8s-calico--apiserver--c6767cb7f--vt2wp-eth0" May 15 10:39:51.042783 env[1217]: 2025-05-15 10:39:51.039 [INFO][4926] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:51.042783 env[1217]: 2025-05-15 10:39:51.041 [INFO][4918] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338" May 15 10:39:51.043363 env[1217]: time="2025-05-15T10:39:51.042801263Z" level=info msg="TearDown network for sandbox \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\" successfully" May 15 10:39:51.046271 env[1217]: time="2025-05-15T10:39:51.046226280Z" level=info msg="RemovePodSandbox \"6d7723b2d9f71321385114f6a255eaefe128af0e8b013ccf9a2b7516d6ba3338\" returns successfully" May 15 10:39:51.785000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:51.785000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014e5940 a2=fc6 a3=0 items=0 ppid=1682 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 key=(null) May 15 10:39:51.785000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:51.785000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:51.785000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014e5960 a2=fc6 a3=0 items=0 ppid=1682 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 key=(null) May 15 10:39:51.785000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:51.785000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:51.785000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015cdf60 a2=fc6 a3=0 items=0 ppid=1682 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 key=(null) May 15 10:39:51.785000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:51.786000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:51.786000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001522740 a2=fc6 a3=0 items=0 ppid=1682 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c164,c941 key=(null) May 15 10:39:51.786000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:55.862866 systemd[1]: Started sshd@16-10.0.0.52:22-10.0.0.1:37424.service. May 15 10:39:55.864119 kernel: kauditd_printk_skb: 13 callbacks suppressed May 15 10:39:55.864203 kernel: audit: type=1130 audit(1747305595.862:1439): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.52:22-10.0.0.1:37424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:55.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.52:22-10.0.0.1:37424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:55.900000 audit[4946]: USER_ACCT pid=4946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:55.900758 sshd[4946]: Accepted publickey for core from 10.0.0.1 port 37424 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:55.902238 sshd[4946]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:55.901000 audit[4946]: CRED_ACQ pid=4946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:55.905456 systemd-logind[1201]: New session 17 of user core. May 15 10:39:55.906522 systemd[1]: Started session-17.scope. May 15 10:39:55.908685 kernel: audit: type=1101 audit(1747305595.900:1440): pid=4946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:55.908751 kernel: audit: type=1103 audit(1747305595.901:1441): pid=4946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:55.908792 kernel: audit: type=1006 audit(1747305595.901:1442): pid=4946 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 15 10:39:55.901000 audit[4946]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebd636ae0 a2=3 a3=0 items=0 ppid=1 pid=4946 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.915613 kernel: audit: type=1300 audit(1747305595.901:1442): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebd636ae0 a2=3 a3=0 items=0 ppid=1 pid=4946 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.901000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:55.917154 kernel: audit: type=1327 audit(1747305595.901:1442): proctitle=737368643A20636F7265205B707269765D May 15 10:39:55.917195 kernel: audit: type=1105 audit(1747305595.910:1443): pid=4946 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:55.910000 audit[4946]: USER_START pid=4946 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:55.921851 kernel: audit: type=1103 audit(1747305595.911:1444): pid=4948 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:55.911000 audit[4948]: CRED_ACQ pid=4948 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:56.013349 sshd[4946]: pam_unix(sshd:session): session closed for user core May 15 10:39:56.013000 audit[4946]: USER_END pid=4946 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:56.015654 systemd[1]: sshd@16-10.0.0.52:22-10.0.0.1:37424.service: Deactivated successfully. May 15 10:39:56.016331 systemd[1]: session-17.scope: Deactivated successfully. May 15 10:39:56.016902 systemd-logind[1201]: Session 17 logged out. Waiting for processes to exit. May 15 10:39:56.017734 systemd-logind[1201]: Removed session 17. May 15 10:39:56.013000 audit[4946]: CRED_DISP pid=4946 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:56.022161 kernel: audit: type=1106 audit(1747305596.013:1445): pid=4946 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:56.022263 kernel: audit: type=1104 audit(1747305596.013:1446): pid=4946 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:56.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.52:22-10.0.0.1:37424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:56.848719 kubelet[1951]: E0515 10:39:56.848664 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:01.019413 systemd[1]: Started sshd@17-10.0.0.52:22-10.0.0.1:37430.service. May 15 10:40:01.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.52:22-10.0.0.1:37430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:01.020781 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:40:01.020915 kernel: audit: type=1130 audit(1747305601.019:1448): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.52:22-10.0.0.1:37430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:01.059000 audit[4961]: USER_ACCT pid=4961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.060413 sshd[4961]: Accepted publickey for core from 10.0.0.1 port 37430 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:01.066761 kernel: audit: type=1101 audit(1747305601.059:1449): pid=4961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.066984 kernel: audit: type=1103 audit(1747305601.064:1450): pid=4961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.064000 audit[4961]: CRED_ACQ pid=4961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.065835 sshd[4961]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:01.071983 systemd-logind[1201]: New session 18 of user core. May 15 10:40:01.072931 kernel: audit: type=1006 audit(1747305601.064:1451): pid=4961 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 15 10:40:01.072989 kernel: audit: type=1300 audit(1747305601.064:1451): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeafdd5740 a2=3 a3=0 items=0 ppid=1 pid=4961 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.064000 audit[4961]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeafdd5740 a2=3 a3=0 items=0 ppid=1 pid=4961 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.072912 systemd[1]: Started session-18.scope. May 15 10:40:01.076981 kernel: audit: type=1327 audit(1747305601.064:1451): proctitle=737368643A20636F7265205B707269765D May 15 10:40:01.064000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:01.079000 audit[4961]: USER_START pid=4961 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.080000 audit[4963]: CRED_ACQ pid=4963 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.087240 kernel: audit: type=1105 audit(1747305601.079:1452): pid=4961 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.087318 kernel: audit: type=1103 audit(1747305601.080:1453): pid=4963 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.182726 sshd[4961]: pam_unix(sshd:session): session closed for user core May 15 10:40:01.183000 audit[4961]: USER_END pid=4961 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.187024 systemd[1]: sshd@17-10.0.0.52:22-10.0.0.1:37430.service: Deactivated successfully. May 15 10:40:01.187644 systemd[1]: session-18.scope: Deactivated successfully. May 15 10:40:01.183000 audit[4961]: CRED_DISP pid=4961 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.188399 systemd-logind[1201]: Session 18 logged out. Waiting for processes to exit. May 15 10:40:01.189194 systemd[1]: Started sshd@18-10.0.0.52:22-10.0.0.1:37438.service. May 15 10:40:01.190205 systemd-logind[1201]: Removed session 18. May 15 10:40:01.192980 kernel: audit: type=1106 audit(1747305601.183:1454): pid=4961 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.193026 kernel: audit: type=1104 audit(1747305601.183:1455): pid=4961 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.52:22-10.0.0.1:37430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:01.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.52:22-10.0.0.1:37438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:01.231000 audit[4974]: USER_ACCT pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.231588 sshd[4974]: Accepted publickey for core from 10.0.0.1 port 37438 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:01.232000 audit[4974]: CRED_ACQ pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.232000 audit[4974]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb4f431c0 a2=3 a3=0 items=0 ppid=1 pid=4974 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.232000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:01.232926 sshd[4974]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:01.236768 systemd-logind[1201]: New session 19 of user core. May 15 10:40:01.237676 systemd[1]: Started session-19.scope. May 15 10:40:01.241000 audit[4974]: USER_START pid=4974 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.243000 audit[4976]: CRED_ACQ pid=4976 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.838151 sshd[4974]: pam_unix(sshd:session): session closed for user core May 15 10:40:01.838000 audit[4974]: USER_END pid=4974 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.839000 audit[4974]: CRED_DISP pid=4974 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.841586 systemd[1]: Started sshd@19-10.0.0.52:22-10.0.0.1:37454.service. May 15 10:40:01.842121 systemd[1]: sshd@18-10.0.0.52:22-10.0.0.1:37438.service: Deactivated successfully. May 15 10:40:01.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.52:22-10.0.0.1:37454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:01.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.52:22-10.0.0.1:37438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:01.842656 systemd[1]: session-19.scope: Deactivated successfully. May 15 10:40:01.843343 systemd-logind[1201]: Session 19 logged out. Waiting for processes to exit. May 15 10:40:01.844143 systemd-logind[1201]: Removed session 19. May 15 10:40:01.879000 audit[4985]: USER_ACCT pid=4985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.880522 sshd[4985]: Accepted publickey for core from 10.0.0.1 port 37454 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:01.880000 audit[4985]: CRED_ACQ pid=4985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.880000 audit[4985]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2ad0b7a0 a2=3 a3=0 items=0 ppid=1 pid=4985 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.880000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:01.881546 sshd[4985]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:01.884859 systemd-logind[1201]: New session 20 of user core. May 15 10:40:01.885650 systemd[1]: Started session-20.scope. May 15 10:40:01.889000 audit[4985]: USER_START pid=4985 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:01.890000 audit[4988]: CRED_ACQ pid=4988 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.797000 audit[5000]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=5000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:02.797000 audit[5000]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc525645a0 a2=0 a3=7ffc5256458c items=0 ppid=2102 pid=5000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:02.797000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:02.801000 audit[5000]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:02.801000 audit[5000]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc525645a0 a2=0 a3=0 items=0 ppid=2102 pid=5000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:02.801000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:02.804317 sshd[4985]: pam_unix(sshd:session): session closed for user core May 15 10:40:02.804000 audit[4985]: USER_END pid=4985 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.805000 audit[4985]: CRED_DISP pid=4985 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.808498 systemd[1]: Started sshd@20-10.0.0.52:22-10.0.0.1:37458.service. May 15 10:40:02.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.52:22-10.0.0.1:37458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:02.809672 systemd[1]: sshd@19-10.0.0.52:22-10.0.0.1:37454.service: Deactivated successfully. May 15 10:40:02.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.52:22-10.0.0.1:37454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:02.810494 systemd[1]: session-20.scope: Deactivated successfully. May 15 10:40:02.811511 systemd-logind[1201]: Session 20 logged out. Waiting for processes to exit. May 15 10:40:02.812457 systemd-logind[1201]: Removed session 20. May 15 10:40:02.818000 audit[5005]: NETFILTER_CFG table=filter:125 family=2 entries=32 op=nft_register_rule pid=5005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:02.818000 audit[5005]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff39049620 a2=0 a3=7fff3904960c items=0 ppid=2102 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:02.818000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:02.824000 audit[5005]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=5005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:02.824000 audit[5005]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff39049620 a2=0 a3=0 items=0 ppid=2102 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:02.824000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:02.853000 audit[5002]: USER_ACCT pid=5002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.853906 sshd[5002]: Accepted publickey for core from 10.0.0.1 port 37458 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:02.854000 audit[5002]: CRED_ACQ pid=5002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.854000 audit[5002]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeabe19b50 a2=3 a3=0 items=0 ppid=1 pid=5002 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:02.854000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:02.854824 sshd[5002]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:02.858834 systemd-logind[1201]: New session 21 of user core. May 15 10:40:02.859689 systemd[1]: Started session-21.scope. May 15 10:40:02.863000 audit[5002]: USER_START pid=5002 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.864000 audit[5007]: CRED_ACQ pid=5007 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:03.128347 sshd[5002]: pam_unix(sshd:session): session closed for user core May 15 10:40:03.129000 audit[5002]: USER_END pid=5002 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:03.129000 audit[5002]: CRED_DISP pid=5002 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:03.131335 systemd[1]: sshd@20-10.0.0.52:22-10.0.0.1:37458.service: Deactivated successfully. May 15 10:40:03.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.52:22-10.0.0.1:37458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:03.131920 systemd[1]: session-21.scope: Deactivated successfully. May 15 10:40:03.132842 systemd-logind[1201]: Session 21 logged out. Waiting for processes to exit. May 15 10:40:03.134310 systemd[1]: Started sshd@21-10.0.0.52:22-10.0.0.1:37474.service. May 15 10:40:03.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.52:22-10.0.0.1:37474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:03.135707 systemd-logind[1201]: Removed session 21. May 15 10:40:03.172000 audit[5017]: USER_ACCT pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:03.172958 sshd[5017]: Accepted publickey for core from 10.0.0.1 port 37474 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:03.173000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:03.173000 audit[5017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebbcef750 a2=3 a3=0 items=0 ppid=1 pid=5017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:03.173000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:03.174195 sshd[5017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:03.177632 systemd-logind[1201]: New session 22 of user core. May 15 10:40:03.178494 systemd[1]: Started session-22.scope. May 15 10:40:03.181000 audit[5017]: USER_START pid=5017 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:03.183000 audit[5019]: CRED_ACQ pid=5019 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:03.281967 sshd[5017]: pam_unix(sshd:session): session closed for user core May 15 10:40:03.282000 audit[5017]: USER_END pid=5017 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:03.282000 audit[5017]: CRED_DISP pid=5017 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:03.284532 systemd[1]: sshd@21-10.0.0.52:22-10.0.0.1:37474.service: Deactivated successfully. May 15 10:40:03.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.52:22-10.0.0.1:37474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:03.285282 systemd[1]: session-22.scope: Deactivated successfully. May 15 10:40:03.285985 systemd-logind[1201]: Session 22 logged out. Waiting for processes to exit. May 15 10:40:03.286803 systemd-logind[1201]: Removed session 22. May 15 10:40:03.490970 kubelet[1951]: E0515 10:40:03.490937 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:07.779825 kubelet[1951]: I0515 10:40:07.779761 1951 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:40:07.846000 audit[5056]: NETFILTER_CFG table=filter:127 family=2 entries=32 op=nft_register_rule pid=5056 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:07.848714 kubelet[1951]: E0515 10:40:07.848645 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:07.849339 kernel: kauditd_printk_skb: 57 callbacks suppressed May 15 10:40:07.849585 kernel: audit: type=1325 audit(1747305607.846:1497): table=filter:127 family=2 entries=32 op=nft_register_rule pid=5056 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:07.846000 audit[5056]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffef4290990 a2=0 a3=7ffef429097c items=0 ppid=2102 pid=5056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.857188 kernel: audit: type=1300 audit(1747305607.846:1497): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffef4290990 a2=0 a3=7ffef429097c items=0 ppid=2102 pid=5056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:07.859805 kernel: audit: type=1327 audit(1747305607.846:1497): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:07.861000 audit[5056]: NETFILTER_CFG table=nat:128 family=2 entries=34 op=nft_register_chain pid=5056 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:07.861000 audit[5056]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffef4290990 a2=0 a3=7ffef429097c items=0 ppid=2102 pid=5056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.871483 kernel: audit: type=1325 audit(1747305607.861:1498): table=nat:128 family=2 entries=34 op=nft_register_chain pid=5056 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:07.871645 kernel: audit: type=1300 audit(1747305607.861:1498): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffef4290990 a2=0 a3=7ffef429097c items=0 ppid=2102 pid=5056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.871670 kernel: audit: type=1327 audit(1747305607.861:1498): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:07.861000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:08.287558 systemd[1]: Started sshd@22-10.0.0.52:22-10.0.0.1:43994.service. May 15 10:40:08.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.52:22-10.0.0.1:43994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:08.293418 kernel: audit: type=1130 audit(1747305608.286:1499): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.52:22-10.0.0.1:43994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:08.328000 audit[5058]: USER_ACCT pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:08.330500 sshd[5058]: Accepted publickey for core from 10.0.0.1 port 43994 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:08.332834 sshd[5058]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:08.331000 audit[5058]: CRED_ACQ pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:08.336858 systemd-logind[1201]: New session 23 of user core. May 15 10:40:08.337692 systemd[1]: Started session-23.scope. May 15 10:40:08.338335 kernel: audit: type=1101 audit(1747305608.328:1500): pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:08.338444 kernel: audit: type=1103 audit(1747305608.331:1501): pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:08.338468 kernel: audit: type=1006 audit(1747305608.331:1502): pid=5058 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 15 10:40:08.331000 audit[5058]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd250a6d40 a2=3 a3=0 items=0 ppid=1 pid=5058 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:08.331000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:08.341000 audit[5058]: USER_START pid=5058 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:08.342000 audit[5060]: CRED_ACQ pid=5060 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:08.478768 sshd[5058]: pam_unix(sshd:session): session closed for user core May 15 10:40:08.478000 audit[5058]: USER_END pid=5058 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:08.478000 audit[5058]: CRED_DISP pid=5058 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:08.481429 systemd[1]: sshd@22-10.0.0.52:22-10.0.0.1:43994.service: Deactivated successfully. May 15 10:40:08.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.52:22-10.0.0.1:43994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:08.482131 systemd[1]: session-23.scope: Deactivated successfully. May 15 10:40:08.482628 systemd-logind[1201]: Session 23 logged out. Waiting for processes to exit. May 15 10:40:08.483296 systemd-logind[1201]: Removed session 23. May 15 10:40:09.420000 audit[5072]: NETFILTER_CFG table=filter:129 family=2 entries=20 op=nft_register_rule pid=5072 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:09.420000 audit[5072]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffffed1c50 a2=0 a3=7fffffed1c3c items=0 ppid=2102 pid=5072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.420000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:09.426000 audit[5072]: NETFILTER_CFG table=nat:130 family=2 entries=106 op=nft_register_chain pid=5072 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:09.426000 audit[5072]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffffed1c50 a2=0 a3=7fffffed1c3c items=0 ppid=2102 pid=5072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.426000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:11.849006 kubelet[1951]: E0515 10:40:11.848931 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:13.484571 systemd[1]: Started sshd@23-10.0.0.52:22-10.0.0.1:38292.service. May 15 10:40:13.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.52:22-10.0.0.1:38292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:13.485594 kernel: kauditd_printk_skb: 13 callbacks suppressed May 15 10:40:13.485659 kernel: audit: type=1130 audit(1747305613.483:1510): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.52:22-10.0.0.1:38292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:13.523000 audit[5074]: USER_ACCT pid=5074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.524807 sshd[5074]: Accepted publickey for core from 10.0.0.1 port 38292 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:13.526855 sshd[5074]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:13.523000 audit[5074]: CRED_ACQ pid=5074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.530603 systemd-logind[1201]: New session 24 of user core. May 15 10:40:13.531475 systemd[1]: Started session-24.scope. May 15 10:40:13.532178 kernel: audit: type=1101 audit(1747305613.523:1511): pid=5074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.532258 kernel: audit: type=1103 audit(1747305613.523:1512): pid=5074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.532281 kernel: audit: type=1006 audit(1747305613.523:1513): pid=5074 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 15 10:40:13.534498 kernel: audit: type=1300 audit(1747305613.523:1513): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbec45110 a2=3 a3=0 items=0 ppid=1 pid=5074 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:13.523000 audit[5074]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbec45110 a2=3 a3=0 items=0 ppid=1 pid=5074 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:13.538477 kernel: audit: type=1327 audit(1747305613.523:1513): proctitle=737368643A20636F7265205B707269765D May 15 10:40:13.523000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:13.533000 audit[5074]: USER_START pid=5074 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.544005 kernel: audit: type=1105 audit(1747305613.533:1514): pid=5074 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.544065 kernel: audit: type=1103 audit(1747305613.537:1515): pid=5076 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.537000 audit[5076]: CRED_ACQ pid=5076 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.644538 sshd[5074]: pam_unix(sshd:session): session closed for user core May 15 10:40:13.644000 audit[5074]: USER_END pid=5074 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.646672 systemd[1]: sshd@23-10.0.0.52:22-10.0.0.1:38292.service: Deactivated successfully. May 15 10:40:13.647436 systemd[1]: session-24.scope: Deactivated successfully. May 15 10:40:13.644000 audit[5074]: CRED_DISP pid=5074 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.650977 systemd-logind[1201]: Session 24 logged out. Waiting for processes to exit. May 15 10:40:13.651688 systemd-logind[1201]: Removed session 24. May 15 10:40:13.653161 kernel: audit: type=1106 audit(1747305613.644:1516): pid=5074 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.653204 kernel: audit: type=1104 audit(1747305613.644:1517): pid=5074 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.52:22-10.0.0.1:38292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:18.648533 systemd[1]: Started sshd@24-10.0.0.52:22-10.0.0.1:38298.service. May 15 10:40:18.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.52:22-10.0.0.1:38298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:18.649609 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:40:18.649664 kernel: audit: type=1130 audit(1747305618.647:1519): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.52:22-10.0.0.1:38298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:18.684000 audit[5094]: USER_ACCT pid=5094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.685809 sshd[5094]: Accepted publickey for core from 10.0.0.1 port 38298 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:18.687807 sshd[5094]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:18.686000 audit[5094]: CRED_ACQ pid=5094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.691712 systemd-logind[1201]: New session 25 of user core. May 15 10:40:18.692769 systemd[1]: Started session-25.scope. May 15 10:40:18.694094 kernel: audit: type=1101 audit(1747305618.684:1520): pid=5094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.694155 kernel: audit: type=1103 audit(1747305618.686:1521): pid=5094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.694183 kernel: audit: type=1006 audit(1747305618.686:1522): pid=5094 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 15 10:40:18.686000 audit[5094]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff744b73b0 a2=3 a3=0 items=0 ppid=1 pid=5094 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:18.700880 kernel: audit: type=1300 audit(1747305618.686:1522): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff744b73b0 a2=3 a3=0 items=0 ppid=1 pid=5094 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:18.700928 kernel: audit: type=1327 audit(1747305618.686:1522): proctitle=737368643A20636F7265205B707269765D May 15 10:40:18.686000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:18.696000 audit[5094]: USER_START pid=5094 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.708759 kernel: audit: type=1105 audit(1747305618.696:1523): pid=5094 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.708816 kernel: audit: type=1103 audit(1747305618.697:1524): pid=5096 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.697000 audit[5096]: CRED_ACQ pid=5096 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.816302 sshd[5094]: pam_unix(sshd:session): session closed for user core May 15 10:40:18.817000 audit[5094]: USER_END pid=5094 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.820519 systemd[1]: sshd@24-10.0.0.52:22-10.0.0.1:38298.service: Deactivated successfully. May 15 10:40:18.821177 systemd[1]: session-25.scope: Deactivated successfully. May 15 10:40:18.821665 systemd-logind[1201]: Session 25 logged out. Waiting for processes to exit. May 15 10:40:18.822281 systemd-logind[1201]: Removed session 25. May 15 10:40:18.818000 audit[5094]: CRED_DISP pid=5094 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.827411 kernel: audit: type=1106 audit(1747305618.817:1525): pid=5094 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.827456 kernel: audit: type=1104 audit(1747305618.818:1526): pid=5094 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.52:22-10.0.0.1:38298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:23.821179 systemd[1]: Started sshd@25-10.0.0.52:22-10.0.0.1:37536.service. May 15 10:40:23.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.52:22-10.0.0.1:37536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:24.044337 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:40:24.044494 kernel: audit: type=1130 audit(1747305623.819:1528): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.52:22-10.0.0.1:37536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:24.179000 audit[5126]: USER_ACCT pid=5126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:24.180756 sshd[5126]: Accepted publickey for core from 10.0.0.1 port 37536 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:24.183000 audit[5126]: CRED_ACQ pid=5126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:24.185028 sshd[5126]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:24.188247 kernel: audit: type=1101 audit(1747305624.179:1529): pid=5126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:24.188313 kernel: audit: type=1103 audit(1747305624.183:1530): pid=5126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:24.188334 kernel: audit: type=1006 audit(1747305624.183:1531): pid=5126 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 15 10:40:24.188524 systemd-logind[1201]: New session 26 of user core. May 15 10:40:24.189160 systemd[1]: Started session-26.scope. May 15 10:40:24.183000 audit[5126]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe994357b0 a2=3 a3=0 items=0 ppid=1 pid=5126 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:24.194417 kernel: audit: type=1300 audit(1747305624.183:1531): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe994357b0 a2=3 a3=0 items=0 ppid=1 pid=5126 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:24.194463 kernel: audit: type=1327 audit(1747305624.183:1531): proctitle=737368643A20636F7265205B707269765D May 15 10:40:24.183000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:24.189000 audit[5126]: USER_START pid=5126 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:24.199966 kernel: audit: type=1105 audit(1747305624.189:1532): pid=5126 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:24.193000 audit[5128]: CRED_ACQ pid=5128 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:24.203454 kernel: audit: type=1103 audit(1747305624.193:1533): pid=5128 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:24.368937 systemd[1]: run-containerd-runc-k8s.io-85c9231797efea3a8c72ac3736bc49b4c169391eead47167d50a25db2a0b64d6-runc.pmpzWt.mount: Deactivated successfully. May 15 10:40:24.398850 sshd[5126]: pam_unix(sshd:session): session closed for user core May 15 10:40:24.398000 audit[5126]: USER_END pid=5126 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:24.398000 audit[5126]: CRED_DISP pid=5126 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:24.401646 systemd[1]: sshd@25-10.0.0.52:22-10.0.0.1:37536.service: Deactivated successfully. May 15 10:40:24.402504 systemd[1]: session-26.scope: Deactivated successfully. May 15 10:40:24.408513 kernel: audit: type=1106 audit(1747305624.398:1534): pid=5126 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:24.408621 kernel: audit: type=1104 audit(1747305624.398:1535): pid=5126 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:24.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.52:22-10.0.0.1:37536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:24.409342 systemd-logind[1201]: Session 26 logged out. Waiting for processes to exit. May 15 10:40:24.410306 systemd-logind[1201]: Removed session 26.