May 15 10:38:55.828508 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu May 15 09:06:41 -00 2025 May 15 10:38:55.828526 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:38:55.828536 kernel: BIOS-provided physical RAM map: May 15 10:38:55.828541 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 15 10:38:55.828546 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 15 10:38:55.828552 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 15 10:38:55.828558 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 15 10:38:55.828564 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 15 10:38:55.828569 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 15 10:38:55.828576 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 15 10:38:55.828582 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 15 10:38:55.828587 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 15 10:38:55.828593 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 15 10:38:55.828598 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 15 10:38:55.828605 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 15 10:38:55.828612 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 15 10:38:55.828618 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 15 10:38:55.828624 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 15 10:38:55.828630 kernel: NX (Execute Disable) protection: active May 15 10:38:55.828636 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 15 10:38:55.828642 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 15 10:38:55.828647 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 15 10:38:55.828653 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 15 10:38:55.828658 kernel: extended physical RAM map: May 15 10:38:55.828664 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 15 10:38:55.828672 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 15 10:38:55.828678 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 15 10:38:55.828684 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 15 10:38:55.828690 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 15 10:38:55.828695 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 15 10:38:55.828701 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 15 10:38:55.828707 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 15 10:38:55.828713 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 15 10:38:55.828718 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 15 10:38:55.828724 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 15 10:38:55.828730 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 15 10:38:55.828737 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 15 10:38:55.828743 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 15 10:38:55.828748 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 15 10:38:55.828754 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 15 10:38:55.828763 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 15 10:38:55.828769 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 15 10:38:55.828776 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 15 10:38:55.828783 kernel: efi: EFI v2.70 by EDK II May 15 10:38:55.828789 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 15 10:38:55.828796 kernel: random: crng init done May 15 10:38:55.828802 kernel: SMBIOS 2.8 present. May 15 10:38:55.828815 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 15 10:38:55.828821 kernel: Hypervisor detected: KVM May 15 10:38:55.828828 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 15 10:38:55.828834 kernel: kvm-clock: cpu 0, msr 4519a001, primary cpu clock May 15 10:38:55.828840 kernel: kvm-clock: using sched offset of 4266025243 cycles May 15 10:38:55.828849 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 15 10:38:55.828855 kernel: tsc: Detected 2794.748 MHz processor May 15 10:38:55.828862 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 10:38:55.828868 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 10:38:55.828875 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 15 10:38:55.828881 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 10:38:55.828888 kernel: Using GB pages for direct mapping May 15 10:38:55.828894 kernel: Secure boot disabled May 15 10:38:55.828900 kernel: ACPI: Early table checksum verification disabled May 15 10:38:55.828908 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 15 10:38:55.828915 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 15 10:38:55.828921 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:55.828928 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:55.828934 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 15 10:38:55.828941 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:55.828947 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:55.828954 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:55.828960 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:55.828968 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 15 10:38:55.828975 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 15 10:38:55.828981 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 15 10:38:55.828987 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 15 10:38:55.828994 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 15 10:38:55.829000 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 15 10:38:55.829006 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 15 10:38:55.829013 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 15 10:38:55.829019 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 15 10:38:55.829027 kernel: No NUMA configuration found May 15 10:38:55.829033 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 15 10:38:55.829040 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 15 10:38:55.829046 kernel: Zone ranges: May 15 10:38:55.829053 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 10:38:55.829059 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 15 10:38:55.829066 kernel: Normal empty May 15 10:38:55.829072 kernel: Movable zone start for each node May 15 10:38:55.829088 kernel: Early memory node ranges May 15 10:38:55.829096 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 15 10:38:55.829103 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 15 10:38:55.829109 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 15 10:38:55.829116 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 15 10:38:55.829122 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 15 10:38:55.829128 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 15 10:38:55.829134 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 15 10:38:55.829141 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 10:38:55.829147 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 15 10:38:55.829154 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 15 10:38:55.829161 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 10:38:55.829168 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 15 10:38:55.829174 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 15 10:38:55.829181 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 15 10:38:55.829187 kernel: ACPI: PM-Timer IO Port: 0x608 May 15 10:38:55.829194 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 15 10:38:55.829200 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 15 10:38:55.829207 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 15 10:38:55.829214 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 15 10:38:55.829222 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 15 10:38:55.829229 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 15 10:38:55.829235 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 15 10:38:55.829241 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 10:38:55.829248 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 15 10:38:55.829254 kernel: TSC deadline timer available May 15 10:38:55.829261 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 15 10:38:55.829267 kernel: kvm-guest: KVM setup pv remote TLB flush May 15 10:38:55.829274 kernel: kvm-guest: setup PV sched yield May 15 10:38:55.829282 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 15 10:38:55.829288 kernel: Booting paravirtualized kernel on KVM May 15 10:38:55.829300 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 10:38:55.829308 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 15 10:38:55.829315 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 15 10:38:55.829322 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 15 10:38:55.829329 kernel: pcpu-alloc: [0] 0 1 2 3 May 15 10:38:55.829335 kernel: kvm-guest: setup async PF for cpu 0 May 15 10:38:55.829342 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 15 10:38:55.829349 kernel: kvm-guest: PV spinlocks enabled May 15 10:38:55.829356 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 15 10:38:55.829363 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 15 10:38:55.829371 kernel: Policy zone: DMA32 May 15 10:38:55.829379 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:38:55.829386 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 10:38:55.829393 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 10:38:55.829402 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 10:38:55.829408 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 10:38:55.829416 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 169308K reserved, 0K cma-reserved) May 15 10:38:55.829423 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 15 10:38:55.829429 kernel: ftrace: allocating 34585 entries in 136 pages May 15 10:38:55.829436 kernel: ftrace: allocated 136 pages with 2 groups May 15 10:38:55.829443 kernel: rcu: Hierarchical RCU implementation. May 15 10:38:55.829450 kernel: rcu: RCU event tracing is enabled. May 15 10:38:55.829458 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 15 10:38:55.829466 kernel: Rude variant of Tasks RCU enabled. May 15 10:38:55.829472 kernel: Tracing variant of Tasks RCU enabled. May 15 10:38:55.829479 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 10:38:55.829486 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 15 10:38:55.829493 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 15 10:38:55.829500 kernel: Console: colour dummy device 80x25 May 15 10:38:55.829507 kernel: printk: console [ttyS0] enabled May 15 10:38:55.829513 kernel: ACPI: Core revision 20210730 May 15 10:38:55.829520 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 15 10:38:55.829529 kernel: APIC: Switch to symmetric I/O mode setup May 15 10:38:55.829535 kernel: x2apic enabled May 15 10:38:55.829542 kernel: Switched APIC routing to physical x2apic. May 15 10:38:55.829549 kernel: kvm-guest: setup PV IPIs May 15 10:38:55.829556 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 10:38:55.829562 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 15 10:38:55.829569 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 15 10:38:55.829576 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 15 10:38:55.829583 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 15 10:38:55.829591 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 15 10:38:55.829598 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 10:38:55.829607 kernel: Spectre V2 : Mitigation: Retpolines May 15 10:38:55.829614 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 15 10:38:55.829623 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 15 10:38:55.829630 kernel: RETBleed: Mitigation: untrained return thunk May 15 10:38:55.829637 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 15 10:38:55.829644 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 15 10:38:55.829652 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 15 10:38:55.829660 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 15 10:38:55.829667 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 15 10:38:55.829674 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 15 10:38:55.829681 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 15 10:38:55.829687 kernel: Freeing SMP alternatives memory: 32K May 15 10:38:55.829694 kernel: pid_max: default: 32768 minimum: 301 May 15 10:38:55.829701 kernel: LSM: Security Framework initializing May 15 10:38:55.829708 kernel: SELinux: Initializing. May 15 10:38:55.829714 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:38:55.829722 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:38:55.829729 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 15 10:38:55.829736 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 15 10:38:55.829743 kernel: ... version: 0 May 15 10:38:55.829749 kernel: ... bit width: 48 May 15 10:38:55.829756 kernel: ... generic registers: 6 May 15 10:38:55.829763 kernel: ... value mask: 0000ffffffffffff May 15 10:38:55.829769 kernel: ... max period: 00007fffffffffff May 15 10:38:55.829776 kernel: ... fixed-purpose events: 0 May 15 10:38:55.829784 kernel: ... event mask: 000000000000003f May 15 10:38:55.829791 kernel: signal: max sigframe size: 1776 May 15 10:38:55.829798 kernel: rcu: Hierarchical SRCU implementation. May 15 10:38:55.829810 kernel: smp: Bringing up secondary CPUs ... May 15 10:38:55.829817 kernel: x86: Booting SMP configuration: May 15 10:38:55.829832 kernel: .... node #0, CPUs: #1 May 15 10:38:55.829846 kernel: kvm-clock: cpu 1, msr 4519a041, secondary cpu clock May 15 10:38:55.829853 kernel: kvm-guest: setup async PF for cpu 1 May 15 10:38:55.829859 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 15 10:38:55.829868 kernel: #2 May 15 10:38:55.829874 kernel: kvm-clock: cpu 2, msr 4519a081, secondary cpu clock May 15 10:38:55.829881 kernel: kvm-guest: setup async PF for cpu 2 May 15 10:38:55.829888 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 15 10:38:55.829894 kernel: #3 May 15 10:38:55.829901 kernel: kvm-clock: cpu 3, msr 4519a0c1, secondary cpu clock May 15 10:38:55.829908 kernel: kvm-guest: setup async PF for cpu 3 May 15 10:38:55.829915 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 15 10:38:55.829922 kernel: smp: Brought up 1 node, 4 CPUs May 15 10:38:55.829928 kernel: smpboot: Max logical packages: 1 May 15 10:38:55.829937 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 15 10:38:55.829944 kernel: devtmpfs: initialized May 15 10:38:55.829950 kernel: x86/mm: Memory block size: 128MB May 15 10:38:55.829957 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 15 10:38:55.829964 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 15 10:38:55.829971 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 15 10:38:55.829978 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 15 10:38:55.829984 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 15 10:38:55.829991 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 10:38:55.829999 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 15 10:38:55.830006 kernel: pinctrl core: initialized pinctrl subsystem May 15 10:38:55.830013 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 10:38:55.830020 kernel: audit: initializing netlink subsys (disabled) May 15 10:38:55.830026 kernel: audit: type=2000 audit(1747305535.816:1): state=initialized audit_enabled=0 res=1 May 15 10:38:55.830033 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 10:38:55.830040 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 10:38:55.830046 kernel: cpuidle: using governor menu May 15 10:38:55.830054 kernel: ACPI: bus type PCI registered May 15 10:38:55.830061 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 10:38:55.830068 kernel: dca service started, version 1.12.1 May 15 10:38:55.830074 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 15 10:38:55.830090 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 15 10:38:55.830096 kernel: PCI: Using configuration type 1 for base access May 15 10:38:55.830103 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 10:38:55.830110 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 10:38:55.830117 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 10:38:55.830125 kernel: ACPI: Added _OSI(Module Device) May 15 10:38:55.830132 kernel: ACPI: Added _OSI(Processor Device) May 15 10:38:55.830139 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 10:38:55.830145 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 10:38:55.830152 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 10:38:55.830159 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 10:38:55.830166 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 10:38:55.830172 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 10:38:55.830179 kernel: ACPI: Interpreter enabled May 15 10:38:55.830186 kernel: ACPI: PM: (supports S0 S3 S5) May 15 10:38:55.830194 kernel: ACPI: Using IOAPIC for interrupt routing May 15 10:38:55.830200 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 10:38:55.830207 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 15 10:38:55.830214 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 10:38:55.830325 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 10:38:55.830397 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 15 10:38:55.830464 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 15 10:38:55.830476 kernel: PCI host bridge to bus 0000:00 May 15 10:38:55.830548 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 10:38:55.830609 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 15 10:38:55.830675 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 10:38:55.830736 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 15 10:38:55.830797 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 10:38:55.830865 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 15 10:38:55.830930 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 10:38:55.831012 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 15 10:38:55.831101 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 15 10:38:55.831181 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 15 10:38:55.831277 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 15 10:38:55.831347 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 15 10:38:55.831419 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 15 10:38:55.831488 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 10:38:55.831563 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 15 10:38:55.831646 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 15 10:38:55.831718 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 15 10:38:55.831786 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 15 10:38:55.831874 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 15 10:38:55.831946 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 15 10:38:55.832019 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 15 10:38:55.832110 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 15 10:38:55.832187 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 15 10:38:55.836048 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 15 10:38:55.836137 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 15 10:38:55.836241 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 15 10:38:55.836315 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 15 10:38:55.836389 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 15 10:38:55.836456 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 15 10:38:55.836527 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 15 10:38:55.836594 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 15 10:38:55.836660 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 15 10:38:55.836732 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 15 10:38:55.836802 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 15 10:38:55.836837 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 15 10:38:55.836844 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 15 10:38:55.836851 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 10:38:55.836858 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 15 10:38:55.836865 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 15 10:38:55.836872 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 15 10:38:55.836879 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 15 10:38:55.836888 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 15 10:38:55.836895 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 15 10:38:55.836902 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 15 10:38:55.836908 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 15 10:38:55.836919 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 15 10:38:55.836926 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 15 10:38:55.836933 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 15 10:38:55.836940 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 15 10:38:55.840797 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 15 10:38:55.840823 kernel: iommu: Default domain type: Translated May 15 10:38:55.840831 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 10:38:55.840914 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 15 10:38:55.841014 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 10:38:55.841127 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 15 10:38:55.841147 kernel: vgaarb: loaded May 15 10:38:55.841159 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 10:38:55.841169 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 10:38:55.841181 kernel: PTP clock support registered May 15 10:38:55.841190 kernel: Registered efivars operations May 15 10:38:55.841199 kernel: PCI: Using ACPI for IRQ routing May 15 10:38:55.841205 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 10:38:55.841212 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 15 10:38:55.841219 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 15 10:38:55.841226 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 15 10:38:55.841232 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 15 10:38:55.841239 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 15 10:38:55.841248 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 15 10:38:55.841255 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 15 10:38:55.841261 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 15 10:38:55.841268 kernel: clocksource: Switched to clocksource kvm-clock May 15 10:38:55.841275 kernel: VFS: Disk quotas dquot_6.6.0 May 15 10:38:55.841282 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 10:38:55.841289 kernel: pnp: PnP ACPI init May 15 10:38:55.841373 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 15 10:38:55.841386 kernel: pnp: PnP ACPI: found 6 devices May 15 10:38:55.841394 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 10:38:55.841401 kernel: NET: Registered PF_INET protocol family May 15 10:38:55.841408 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 10:38:55.841415 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 10:38:55.841422 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 10:38:55.841429 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 10:38:55.841436 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 10:38:55.841443 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 10:38:55.841451 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:38:55.841458 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:38:55.841465 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 10:38:55.841472 kernel: NET: Registered PF_XDP protocol family May 15 10:38:55.841541 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 15 10:38:55.841610 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 15 10:38:55.842483 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 15 10:38:55.842569 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 15 10:38:55.842634 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 15 10:38:55.842707 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 15 10:38:55.842780 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 15 10:38:55.842850 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 15 10:38:55.842860 kernel: PCI: CLS 0 bytes, default 64 May 15 10:38:55.842879 kernel: Initialise system trusted keyrings May 15 10:38:55.842887 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 10:38:55.842894 kernel: Key type asymmetric registered May 15 10:38:55.842900 kernel: Asymmetric key parser 'x509' registered May 15 10:38:55.842910 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 10:38:55.842917 kernel: io scheduler mq-deadline registered May 15 10:38:55.842933 kernel: io scheduler kyber registered May 15 10:38:55.842943 kernel: io scheduler bfq registered May 15 10:38:55.842951 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 10:38:55.842959 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 15 10:38:55.842966 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 15 10:38:55.842985 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 15 10:38:55.842993 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 10:38:55.843002 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 10:38:55.843010 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 15 10:38:55.843017 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 10:38:55.843024 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 10:38:55.843119 kernel: rtc_cmos 00:04: RTC can wake from S4 May 15 10:38:55.843131 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 10:38:55.843206 kernel: rtc_cmos 00:04: registered as rtc0 May 15 10:38:55.843295 kernel: rtc_cmos 00:04: setting system clock to 2025-05-15T10:38:55 UTC (1747305535) May 15 10:38:55.843373 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 15 10:38:55.843384 kernel: efifb: probing for efifb May 15 10:38:55.843404 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 15 10:38:55.843411 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 15 10:38:55.843418 kernel: efifb: scrolling: redraw May 15 10:38:55.843425 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 15 10:38:55.843433 kernel: Console: switching to colour frame buffer device 160x50 May 15 10:38:55.843451 kernel: fb0: EFI VGA frame buffer device May 15 10:38:55.843459 kernel: pstore: Registered efi as persistent store backend May 15 10:38:55.843469 kernel: NET: Registered PF_INET6 protocol family May 15 10:38:55.843476 kernel: Segment Routing with IPv6 May 15 10:38:55.843483 kernel: In-situ OAM (IOAM) with IPv6 May 15 10:38:55.843503 kernel: NET: Registered PF_PACKET protocol family May 15 10:38:55.843510 kernel: Key type dns_resolver registered May 15 10:38:55.843517 kernel: IPI shorthand broadcast: enabled May 15 10:38:55.843526 kernel: sched_clock: Marking stable (417125363, 132381493)->(593610013, -44103157) May 15 10:38:55.843534 kernel: registered taskstats version 1 May 15 10:38:55.843553 kernel: Loading compiled-in X.509 certificates May 15 10:38:55.843561 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 04007c306af6b7696d09b3c2eafc1297036fd28e' May 15 10:38:55.843569 kernel: Key type .fscrypt registered May 15 10:38:55.843576 kernel: Key type fscrypt-provisioning registered May 15 10:38:55.843590 kernel: pstore: Using crash dump compression: deflate May 15 10:38:55.843602 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 10:38:55.843611 kernel: ima: Allocated hash algorithm: sha1 May 15 10:38:55.843618 kernel: ima: No architecture policies found May 15 10:38:55.843625 kernel: clk: Disabling unused clocks May 15 10:38:55.843633 kernel: Freeing unused kernel image (initmem) memory: 47472K May 15 10:38:55.843640 kernel: Write protecting the kernel read-only data: 28672k May 15 10:38:55.843647 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 10:38:55.843661 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 10:38:55.843680 kernel: Run /init as init process May 15 10:38:55.843687 kernel: with arguments: May 15 10:38:55.843696 kernel: /init May 15 10:38:55.843703 kernel: with environment: May 15 10:38:55.843710 kernel: HOME=/ May 15 10:38:55.843717 kernel: TERM=linux May 15 10:38:55.843724 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 10:38:55.843744 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:38:55.843753 systemd[1]: Detected virtualization kvm. May 15 10:38:55.843761 systemd[1]: Detected architecture x86-64. May 15 10:38:55.843771 systemd[1]: Running in initrd. May 15 10:38:55.843778 systemd[1]: No hostname configured, using default hostname. May 15 10:38:55.843797 systemd[1]: Hostname set to . May 15 10:38:55.843813 systemd[1]: Initializing machine ID from VM UUID. May 15 10:38:55.843821 systemd[1]: Queued start job for default target initrd.target. May 15 10:38:55.843829 systemd[1]: Started systemd-ask-password-console.path. May 15 10:38:55.843836 systemd[1]: Reached target cryptsetup.target. May 15 10:38:55.843844 systemd[1]: Reached target paths.target. May 15 10:38:55.843851 systemd[1]: Reached target slices.target. May 15 10:38:55.843872 systemd[1]: Reached target swap.target. May 15 10:38:55.843879 systemd[1]: Reached target timers.target. May 15 10:38:55.843888 systemd[1]: Listening on iscsid.socket. May 15 10:38:55.843895 systemd[1]: Listening on iscsiuio.socket. May 15 10:38:55.843903 systemd[1]: Listening on systemd-journald-audit.socket. May 15 10:38:55.843922 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 10:38:55.843930 systemd[1]: Listening on systemd-journald.socket. May 15 10:38:55.843939 systemd[1]: Listening on systemd-networkd.socket. May 15 10:38:55.843947 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:38:55.843955 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:38:55.843973 systemd[1]: Reached target sockets.target. May 15 10:38:55.843981 systemd[1]: Starting kmod-static-nodes.service... May 15 10:38:55.843989 systemd[1]: Finished network-cleanup.service. May 15 10:38:55.843997 systemd[1]: Starting systemd-fsck-usr.service... May 15 10:38:55.844012 systemd[1]: Starting systemd-journald.service... May 15 10:38:55.844024 systemd[1]: Starting systemd-modules-load.service... May 15 10:38:55.844033 systemd[1]: Starting systemd-resolved.service... May 15 10:38:55.844041 systemd[1]: Starting systemd-vconsole-setup.service... May 15 10:38:55.844048 systemd[1]: Finished kmod-static-nodes.service. May 15 10:38:55.844063 systemd[1]: Finished systemd-fsck-usr.service. May 15 10:38:55.844084 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:38:55.844092 systemd[1]: Finished systemd-vconsole-setup.service. May 15 10:38:55.844100 kernel: audit: type=1130 audit(1747305535.833:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:55.844108 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:38:55.844116 kernel: audit: type=1130 audit(1747305535.837:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:55.844126 systemd[1]: Starting dracut-cmdline-ask.service... May 15 10:38:55.844136 systemd-journald[196]: Journal started May 15 10:38:55.844180 systemd-journald[196]: Runtime Journal (/run/log/journal/10d10b0462d042afa14e2f795b7de20c) is 6.0M, max 48.4M, 42.4M free. May 15 10:38:55.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:55.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:55.829853 systemd-modules-load[197]: Inserted module 'overlay' May 15 10:38:55.854855 systemd[1]: Started systemd-journald.service. May 15 10:38:55.854883 kernel: audit: type=1130 audit(1747305535.852:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:55.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:55.851956 systemd-resolved[198]: Positive Trust Anchors: May 15 10:38:55.851966 systemd-resolved[198]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:38:55.851993 systemd-resolved[198]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:38:55.854115 systemd-resolved[198]: Defaulting to hostname 'linux'. May 15 10:38:55.854778 systemd[1]: Started systemd-resolved.service. May 15 10:38:55.856570 systemd[1]: Reached target nss-lookup.target. May 15 10:38:55.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:55.870107 kernel: audit: type=1130 audit(1747305535.856:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:55.874097 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 10:38:55.877466 systemd[1]: Finished dracut-cmdline-ask.service. May 15 10:38:55.878815 kernel: Bridge firewalling registered May 15 10:38:55.878049 systemd-modules-load[197]: Inserted module 'br_netfilter' May 15 10:38:55.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:55.881209 systemd[1]: Starting dracut-cmdline.service... May 15 10:38:55.885113 kernel: audit: type=1130 audit(1747305535.880:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:55.892418 dracut-cmdline[214]: dracut-dracut-053 May 15 10:38:55.894432 dracut-cmdline[214]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:38:55.901107 kernel: SCSI subsystem initialized May 15 10:38:55.913468 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 10:38:55.913495 kernel: device-mapper: uevent: version 1.0.3 May 15 10:38:55.914841 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 10:38:55.917772 systemd-modules-load[197]: Inserted module 'dm_multipath' May 15 10:38:55.918566 systemd[1]: Finished systemd-modules-load.service. May 15 10:38:55.928129 kernel: audit: type=1130 audit(1747305535.919:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:55.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:55.920601 systemd[1]: Starting systemd-sysctl.service... May 15 10:38:55.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:55.930582 systemd[1]: Finished systemd-sysctl.service. May 15 10:38:55.935412 kernel: audit: type=1130 audit(1747305535.931:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:55.962107 kernel: Loading iSCSI transport class v2.0-870. May 15 10:38:55.977098 kernel: iscsi: registered transport (tcp) May 15 10:38:55.998366 kernel: iscsi: registered transport (qla4xxx) May 15 10:38:55.998450 kernel: QLogic iSCSI HBA Driver May 15 10:38:56.025789 systemd[1]: Finished dracut-cmdline.service. May 15 10:38:56.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:56.028370 systemd[1]: Starting dracut-pre-udev.service... May 15 10:38:56.032744 kernel: audit: type=1130 audit(1747305536.027:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:56.077122 kernel: raid6: avx2x4 gen() 30001 MB/s May 15 10:38:56.094124 kernel: raid6: avx2x4 xor() 7259 MB/s May 15 10:38:56.111109 kernel: raid6: avx2x2 gen() 32122 MB/s May 15 10:38:56.128105 kernel: raid6: avx2x2 xor() 19287 MB/s May 15 10:38:56.145113 kernel: raid6: avx2x1 gen() 26513 MB/s May 15 10:38:56.162115 kernel: raid6: avx2x1 xor() 15389 MB/s May 15 10:38:56.179119 kernel: raid6: sse2x4 gen() 14813 MB/s May 15 10:38:56.196110 kernel: raid6: sse2x4 xor() 7152 MB/s May 15 10:38:56.213120 kernel: raid6: sse2x2 gen() 16274 MB/s May 15 10:38:56.230111 kernel: raid6: sse2x2 xor() 9849 MB/s May 15 10:38:56.247106 kernel: raid6: sse2x1 gen() 12418 MB/s May 15 10:38:56.264443 kernel: raid6: sse2x1 xor() 7826 MB/s May 15 10:38:56.264487 kernel: raid6: using algorithm avx2x2 gen() 32122 MB/s May 15 10:38:56.264500 kernel: raid6: .... xor() 19287 MB/s, rmw enabled May 15 10:38:56.265117 kernel: raid6: using avx2x2 recovery algorithm May 15 10:38:56.278108 kernel: xor: automatically using best checksumming function avx May 15 10:38:56.369124 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 10:38:56.377631 systemd[1]: Finished dracut-pre-udev.service. May 15 10:38:56.382136 kernel: audit: type=1130 audit(1747305536.377:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:56.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:56.381000 audit: BPF prog-id=7 op=LOAD May 15 10:38:56.382000 audit: BPF prog-id=8 op=LOAD May 15 10:38:56.382525 systemd[1]: Starting systemd-udevd.service... May 15 10:38:56.394427 systemd-udevd[400]: Using default interface naming scheme 'v252'. May 15 10:38:56.399028 systemd[1]: Started systemd-udevd.service. May 15 10:38:56.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:56.400732 systemd[1]: Starting dracut-pre-trigger.service... May 15 10:38:56.412450 dracut-pre-trigger[402]: rd.md=0: removing MD RAID activation May 15 10:38:56.438391 systemd[1]: Finished dracut-pre-trigger.service. May 15 10:38:56.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:56.440052 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:38:56.493401 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:38:56.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:56.525233 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 15 10:38:56.530699 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 10:38:56.530712 kernel: GPT:9289727 != 19775487 May 15 10:38:56.530721 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 10:38:56.530729 kernel: GPT:9289727 != 19775487 May 15 10:38:56.530737 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 10:38:56.530745 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:38:56.534119 kernel: cryptd: max_cpu_qlen set to 1000 May 15 10:38:56.543103 kernel: libata version 3.00 loaded. May 15 10:38:56.543129 kernel: AVX2 version of gcm_enc/dec engaged. May 15 10:38:56.544217 kernel: AES CTR mode by8 optimization enabled May 15 10:38:56.558337 kernel: ahci 0000:00:1f.2: version 3.0 May 15 10:38:56.593924 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 15 10:38:56.593942 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 15 10:38:56.594056 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 15 10:38:56.594204 kernel: scsi host0: ahci May 15 10:38:56.594297 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (452) May 15 10:38:56.594312 kernel: scsi host1: ahci May 15 10:38:56.594402 kernel: scsi host2: ahci May 15 10:38:56.594509 kernel: scsi host3: ahci May 15 10:38:56.594597 kernel: scsi host4: ahci May 15 10:38:56.594677 kernel: scsi host5: ahci May 15 10:38:56.594758 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 May 15 10:38:56.594767 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 May 15 10:38:56.594779 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 May 15 10:38:56.594788 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 May 15 10:38:56.594806 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 May 15 10:38:56.594815 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 May 15 10:38:56.584407 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 10:38:56.590949 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 10:38:56.597366 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 10:38:56.601710 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 10:38:56.605878 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:38:56.609929 systemd[1]: Starting disk-uuid.service... May 15 10:38:56.630149 disk-uuid[536]: Primary Header is updated. May 15 10:38:56.630149 disk-uuid[536]: Secondary Entries is updated. May 15 10:38:56.630149 disk-uuid[536]: Secondary Header is updated. May 15 10:38:56.634101 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:38:56.638124 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:38:56.901108 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 15 10:38:56.909335 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 15 10:38:56.909359 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 15 10:38:56.910102 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 15 10:38:56.911108 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 15 10:38:56.912109 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 15 10:38:56.913669 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 15 10:38:56.913688 kernel: ata3.00: applying bridge limits May 15 10:38:56.914376 kernel: ata3.00: configured for UDMA/100 May 15 10:38:56.915094 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 15 10:38:56.944176 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 15 10:38:56.961599 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 15 10:38:56.961615 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 15 10:38:57.653568 disk-uuid[537]: The operation has completed successfully. May 15 10:38:57.654866 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:38:57.682495 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 10:38:57.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:57.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:57.682575 systemd[1]: Finished disk-uuid.service. May 15 10:38:57.685589 systemd[1]: Starting verity-setup.service... May 15 10:38:57.697097 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 15 10:38:57.715207 systemd[1]: Found device dev-mapper-usr.device. May 15 10:38:57.717966 systemd[1]: Mounting sysusr-usr.mount... May 15 10:38:57.720439 systemd[1]: Finished verity-setup.service. May 15 10:38:57.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:57.779103 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 10:38:57.779627 systemd[1]: Mounted sysusr-usr.mount. May 15 10:38:57.781194 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 10:38:57.783151 systemd[1]: Starting ignition-setup.service... May 15 10:38:57.785272 systemd[1]: Starting parse-ip-for-networkd.service... May 15 10:38:57.795832 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 10:38:57.795874 kernel: BTRFS info (device vda6): using free space tree May 15 10:38:57.795883 kernel: BTRFS info (device vda6): has skinny extents May 15 10:38:57.805304 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 10:38:57.850307 systemd[1]: Finished parse-ip-for-networkd.service. May 15 10:38:57.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:57.858000 audit: BPF prog-id=9 op=LOAD May 15 10:38:57.859175 systemd[1]: Starting systemd-networkd.service... May 15 10:38:57.879709 systemd-networkd[712]: lo: Link UP May 15 10:38:57.879721 systemd-networkd[712]: lo: Gained carrier May 15 10:38:57.880165 systemd-networkd[712]: Enumeration completed May 15 10:38:57.880355 systemd-networkd[712]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:38:57.880571 systemd[1]: Started systemd-networkd.service. May 15 10:38:57.881336 systemd-networkd[712]: eth0: Link UP May 15 10:38:57.881340 systemd-networkd[712]: eth0: Gained carrier May 15 10:38:57.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:57.886555 systemd[1]: Reached target network.target. May 15 10:38:57.888715 systemd[1]: Starting iscsiuio.service... May 15 10:38:57.912329 systemd[1]: Started iscsiuio.service. May 15 10:38:57.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:57.914391 systemd[1]: Starting iscsid.service... May 15 10:38:57.916177 systemd-networkd[712]: eth0: DHCPv4 address 10.0.0.58/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:38:57.917528 iscsid[717]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 10:38:57.917528 iscsid[717]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 10:38:57.917528 iscsid[717]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 10:38:57.917528 iscsid[717]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 10:38:57.917528 iscsid[717]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 10:38:57.917528 iscsid[717]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 10:38:57.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:57.919660 systemd[1]: Started iscsid.service. May 15 10:38:57.928119 systemd[1]: Starting dracut-initqueue.service... May 15 10:38:57.950312 systemd[1]: Finished dracut-initqueue.service. May 15 10:38:57.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:57.951267 systemd[1]: Reached target remote-fs-pre.target. May 15 10:38:57.952784 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:38:57.953846 systemd[1]: Reached target remote-fs.target. May 15 10:38:57.955249 systemd[1]: Starting dracut-pre-mount.service... May 15 10:38:57.962007 systemd[1]: Finished dracut-pre-mount.service. May 15 10:38:57.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:58.054537 systemd[1]: Finished ignition-setup.service. May 15 10:38:58.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:58.056037 systemd[1]: Starting ignition-fetch-offline.service... May 15 10:38:58.214584 ignition[732]: Ignition 2.14.0 May 15 10:38:58.214594 ignition[732]: Stage: fetch-offline May 15 10:38:58.214661 ignition[732]: no configs at "/usr/lib/ignition/base.d" May 15 10:38:58.214669 ignition[732]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:58.214803 ignition[732]: parsed url from cmdline: "" May 15 10:38:58.214806 ignition[732]: no config URL provided May 15 10:38:58.214811 ignition[732]: reading system config file "/usr/lib/ignition/user.ign" May 15 10:38:58.214817 ignition[732]: no config at "/usr/lib/ignition/user.ign" May 15 10:38:58.214838 ignition[732]: op(1): [started] loading QEMU firmware config module May 15 10:38:58.214851 ignition[732]: op(1): executing: "modprobe" "qemu_fw_cfg" May 15 10:38:58.218259 ignition[732]: op(1): [finished] loading QEMU firmware config module May 15 10:38:58.260559 ignition[732]: parsing config with SHA512: 11060be360d748f5d6c6bc9af3dbd19ae927ff6cc36f5fa7e23160b3300ce23a57819da06bdfc3be37677b1b0784ed1c5c95ed6c8e05849f684ef33ef757ba82 May 15 10:38:58.267675 unknown[732]: fetched base config from "system" May 15 10:38:58.267685 unknown[732]: fetched user config from "qemu" May 15 10:38:58.268842 ignition[732]: fetch-offline: fetch-offline passed May 15 10:38:58.268899 ignition[732]: Ignition finished successfully May 15 10:38:58.284495 systemd[1]: Finished ignition-fetch-offline.service. May 15 10:38:58.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:58.284716 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 10:38:58.285661 systemd[1]: Starting ignition-kargs.service... May 15 10:38:58.320542 ignition[740]: Ignition 2.14.0 May 15 10:38:58.320553 ignition[740]: Stage: kargs May 15 10:38:58.320658 ignition[740]: no configs at "/usr/lib/ignition/base.d" May 15 10:38:58.320667 ignition[740]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:58.321841 ignition[740]: kargs: kargs passed May 15 10:38:58.321877 ignition[740]: Ignition finished successfully May 15 10:38:58.325906 systemd[1]: Finished ignition-kargs.service. May 15 10:38:58.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:58.327440 systemd[1]: Starting ignition-disks.service... May 15 10:38:58.337624 ignition[746]: Ignition 2.14.0 May 15 10:38:58.337634 ignition[746]: Stage: disks May 15 10:38:58.337727 ignition[746]: no configs at "/usr/lib/ignition/base.d" May 15 10:38:58.337736 ignition[746]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:58.339849 ignition[746]: disks: disks passed May 15 10:38:58.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:58.340682 systemd[1]: Finished ignition-disks.service. May 15 10:38:58.339883 ignition[746]: Ignition finished successfully May 15 10:38:58.341961 systemd[1]: Reached target initrd-root-device.target. May 15 10:38:58.343366 systemd[1]: Reached target local-fs-pre.target. May 15 10:38:58.344197 systemd[1]: Reached target local-fs.target. May 15 10:38:58.344970 systemd[1]: Reached target sysinit.target. May 15 10:38:58.346464 systemd[1]: Reached target basic.target. May 15 10:38:58.348125 systemd[1]: Starting systemd-fsck-root.service... May 15 10:38:58.363428 systemd-fsck[754]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 15 10:38:58.544609 systemd[1]: Finished systemd-fsck-root.service. May 15 10:38:58.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:58.545647 systemd[1]: Mounting sysroot.mount... May 15 10:38:58.554765 systemd[1]: Mounted sysroot.mount. May 15 10:38:58.556136 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 10:38:58.556235 systemd[1]: Reached target initrd-root-fs.target. May 15 10:38:58.558691 systemd[1]: Mounting sysroot-usr.mount... May 15 10:38:58.560464 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 10:38:58.562099 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 10:38:58.562129 systemd[1]: Reached target ignition-diskful.target. May 15 10:38:58.566441 systemd[1]: Mounted sysroot-usr.mount. May 15 10:38:58.568500 systemd[1]: Starting initrd-setup-root.service... May 15 10:38:58.573543 initrd-setup-root[764]: cut: /sysroot/etc/passwd: No such file or directory May 15 10:38:58.577673 initrd-setup-root[772]: cut: /sysroot/etc/group: No such file or directory May 15 10:38:58.581496 initrd-setup-root[780]: cut: /sysroot/etc/shadow: No such file or directory May 15 10:38:58.585328 initrd-setup-root[788]: cut: /sysroot/etc/gshadow: No such file or directory May 15 10:38:58.611445 systemd[1]: Finished initrd-setup-root.service. May 15 10:38:58.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:58.612280 systemd[1]: Starting ignition-mount.service... May 15 10:38:58.614274 systemd[1]: Starting sysroot-boot.service... May 15 10:38:58.618585 bash[805]: umount: /sysroot/usr/share/oem: not mounted. May 15 10:38:58.638658 ignition[806]: INFO : Ignition 2.14.0 May 15 10:38:58.638658 ignition[806]: INFO : Stage: mount May 15 10:38:58.640514 ignition[806]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:38:58.640514 ignition[806]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:58.643270 ignition[806]: INFO : mount: mount passed May 15 10:38:58.644135 ignition[806]: INFO : Ignition finished successfully May 15 10:38:58.644311 systemd[1]: Finished ignition-mount.service. May 15 10:38:58.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:58.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:58.646157 systemd[1]: Finished sysroot-boot.service. May 15 10:38:58.725701 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 10:38:58.732026 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (816) May 15 10:38:58.732048 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 10:38:58.732057 kernel: BTRFS info (device vda6): using free space tree May 15 10:38:58.732836 kernel: BTRFS info (device vda6): has skinny extents May 15 10:38:58.736730 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 10:38:58.739011 systemd[1]: Starting ignition-files.service... May 15 10:38:58.755176 ignition[836]: INFO : Ignition 2.14.0 May 15 10:38:58.755176 ignition[836]: INFO : Stage: files May 15 10:38:58.756902 ignition[836]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:38:58.756902 ignition[836]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:58.756902 ignition[836]: DEBUG : files: compiled without relabeling support, skipping May 15 10:38:58.760616 ignition[836]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 10:38:58.760616 ignition[836]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 10:38:58.760616 ignition[836]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 10:38:58.760616 ignition[836]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 10:38:58.760616 ignition[836]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 10:38:58.760553 unknown[836]: wrote ssh authorized keys file for user: core May 15 10:38:58.768728 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 10:38:58.768728 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 15 10:38:58.826234 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 15 10:38:59.092964 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 10:38:59.092964 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 15 10:38:59.096943 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 15 10:38:59.096943 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 15 10:38:59.096943 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 15 10:38:59.096943 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:38:59.096943 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:38:59.096943 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:38:59.096943 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:38:59.096943 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:38:59.096943 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:38:59.096943 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 10:38:59.096943 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 10:38:59.096943 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 10:38:59.096943 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 15 10:38:59.574321 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 15 10:38:59.710315 systemd-networkd[712]: eth0: Gained IPv6LL May 15 10:39:00.134908 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 10:39:00.134908 ignition[836]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 15 10:39:00.139291 ignition[836]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:39:00.139291 ignition[836]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:39:00.139291 ignition[836]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 15 10:39:00.139291 ignition[836]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 15 10:39:00.139291 ignition[836]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:39:00.139291 ignition[836]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:39:00.139291 ignition[836]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 15 10:39:00.139291 ignition[836]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 15 10:39:00.139291 ignition[836]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 15 10:39:00.139291 ignition[836]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 15 10:39:00.139291 ignition[836]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:39:00.174711 ignition[836]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:39:00.177429 ignition[836]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 15 10:39:00.177429 ignition[836]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 10:39:00.177429 ignition[836]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 10:39:00.177429 ignition[836]: INFO : files: files passed May 15 10:39:00.177429 ignition[836]: INFO : Ignition finished successfully May 15 10:39:00.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.176482 systemd[1]: Finished ignition-files.service. May 15 10:39:00.178660 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 10:39:00.180206 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 10:39:00.194362 initrd-setup-root-after-ignition[860]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 15 10:39:00.181036 systemd[1]: Starting ignition-quench.service... May 15 10:39:00.197089 initrd-setup-root-after-ignition[863]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 10:39:00.184902 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 10:39:00.184986 systemd[1]: Finished ignition-quench.service. May 15 10:39:00.186673 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 10:39:00.187808 systemd[1]: Reached target ignition-complete.target. May 15 10:39:00.190197 systemd[1]: Starting initrd-parse-etc.service... May 15 10:39:00.204488 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 10:39:00.204581 systemd[1]: Finished initrd-parse-etc.service. May 15 10:39:00.214634 kernel: kauditd_printk_skb: 27 callbacks suppressed May 15 10:39:00.214653 kernel: audit: type=1130 audit(1747305540.206:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.214664 kernel: audit: type=1131 audit(1747305540.206:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.206438 systemd[1]: Reached target initrd-fs.target. May 15 10:39:00.214757 systemd[1]: Reached target initrd.target. May 15 10:39:00.216311 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 10:39:00.217148 systemd[1]: Starting dracut-pre-pivot.service... May 15 10:39:00.227984 systemd[1]: Finished dracut-pre-pivot.service. May 15 10:39:00.233230 kernel: audit: type=1130 audit(1747305540.228:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.229519 systemd[1]: Starting initrd-cleanup.service... May 15 10:39:00.237903 systemd[1]: Stopped target nss-lookup.target. May 15 10:39:00.239604 systemd[1]: Stopped target remote-cryptsetup.target. May 15 10:39:00.240571 systemd[1]: Stopped target timers.target. May 15 10:39:00.242135 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 10:39:00.248265 kernel: audit: type=1131 audit(1747305540.243:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.242232 systemd[1]: Stopped dracut-pre-pivot.service. May 15 10:39:00.243760 systemd[1]: Stopped target initrd.target. May 15 10:39:00.248339 systemd[1]: Stopped target basic.target. May 15 10:39:00.249893 systemd[1]: Stopped target ignition-complete.target. May 15 10:39:00.251484 systemd[1]: Stopped target ignition-diskful.target. May 15 10:39:00.253159 systemd[1]: Stopped target initrd-root-device.target. May 15 10:39:00.254829 systemd[1]: Stopped target remote-fs.target. May 15 10:39:00.256453 systemd[1]: Stopped target remote-fs-pre.target. May 15 10:39:00.258163 systemd[1]: Stopped target sysinit.target. May 15 10:39:00.259672 systemd[1]: Stopped target local-fs.target. May 15 10:39:00.261270 systemd[1]: Stopped target local-fs-pre.target. May 15 10:39:00.262814 systemd[1]: Stopped target swap.target. May 15 10:39:00.270290 kernel: audit: type=1131 audit(1747305540.265:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.264287 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 10:39:00.264381 systemd[1]: Stopped dracut-pre-mount.service. May 15 10:39:00.276687 kernel: audit: type=1131 audit(1747305540.272:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.265979 systemd[1]: Stopped target cryptsetup.target. May 15 10:39:00.281279 kernel: audit: type=1131 audit(1747305540.276:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.270385 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 10:39:00.270516 systemd[1]: Stopped dracut-initqueue.service. May 15 10:39:00.272282 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 10:39:00.272410 systemd[1]: Stopped ignition-fetch-offline.service. May 15 10:39:00.276880 systemd[1]: Stopped target paths.target. May 15 10:39:00.281340 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 10:39:00.285125 systemd[1]: Stopped systemd-ask-password-console.path. May 15 10:39:00.286812 systemd[1]: Stopped target slices.target. May 15 10:39:00.288625 systemd[1]: Stopped target sockets.target. May 15 10:39:00.290277 systemd[1]: iscsid.socket: Deactivated successfully. May 15 10:39:00.290378 systemd[1]: Closed iscsid.socket. May 15 10:39:00.299442 kernel: audit: type=1131 audit(1747305540.294:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.291694 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 10:39:00.304191 kernel: audit: type=1131 audit(1747305540.299:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.291798 systemd[1]: Closed iscsiuio.socket. May 15 10:39:00.293176 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 10:39:00.311258 kernel: audit: type=1131 audit(1747305540.306:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.306000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.293310 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 10:39:00.313213 ignition[876]: INFO : Ignition 2.14.0 May 15 10:39:00.313213 ignition[876]: INFO : Stage: umount May 15 10:39:00.313213 ignition[876]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:39:00.313213 ignition[876]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:39:00.313213 ignition[876]: INFO : umount: umount passed May 15 10:39:00.313213 ignition[876]: INFO : Ignition finished successfully May 15 10:39:00.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.294999 systemd[1]: ignition-files.service: Deactivated successfully. May 15 10:39:00.295141 systemd[1]: Stopped ignition-files.service. May 15 10:39:00.300606 systemd[1]: Stopping ignition-mount.service... May 15 10:39:00.304215 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 10:39:00.304349 systemd[1]: Stopped kmod-static-nodes.service. May 15 10:39:00.307055 systemd[1]: Stopping sysroot-boot.service... May 15 10:39:00.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.311253 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 10:39:00.311431 systemd[1]: Stopped systemd-udev-trigger.service. May 15 10:39:00.318821 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 10:39:00.319802 systemd[1]: Stopped dracut-pre-trigger.service. May 15 10:39:00.330801 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 10:39:00.332338 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 10:39:00.333307 systemd[1]: Stopped ignition-mount.service. May 15 10:39:00.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.335193 systemd[1]: Stopped target network.target. May 15 10:39:00.336778 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 10:39:00.336818 systemd[1]: Stopped ignition-disks.service. May 15 10:39:00.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.339217 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 10:39:00.339252 systemd[1]: Stopped ignition-kargs.service. May 15 10:39:00.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.341634 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 10:39:00.341666 systemd[1]: Stopped ignition-setup.service. May 15 10:39:00.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.344120 systemd[1]: Stopping systemd-networkd.service... May 15 10:39:00.345842 systemd[1]: Stopping systemd-resolved.service... May 15 10:39:00.347576 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 10:39:00.348125 systemd-networkd[712]: eth0: DHCPv6 lease lost May 15 10:39:00.348616 systemd[1]: Finished initrd-cleanup.service. May 15 10:39:00.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.351556 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 10:39:00.352635 systemd[1]: Stopped systemd-networkd.service. May 15 10:39:00.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.355838 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 10:39:00.357047 systemd[1]: Stopped systemd-resolved.service. May 15 10:39:00.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.359000 audit: BPF prog-id=9 op=UNLOAD May 15 10:39:00.359498 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 10:39:00.359532 systemd[1]: Closed systemd-networkd.socket. May 15 10:39:00.362000 audit: BPF prog-id=6 op=UNLOAD May 15 10:39:00.363139 systemd[1]: Stopping network-cleanup.service... May 15 10:39:00.364898 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 10:39:00.364947 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 10:39:00.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.368004 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 10:39:00.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.368050 systemd[1]: Stopped systemd-sysctl.service. May 15 10:39:00.370882 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 10:39:00.370924 systemd[1]: Stopped systemd-modules-load.service. May 15 10:39:00.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.373967 systemd[1]: Stopping systemd-udevd.service... May 15 10:39:00.376385 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 10:39:00.378502 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 10:39:00.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.378598 systemd[1]: Stopped network-cleanup.service. May 15 10:39:00.383499 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 10:39:00.383608 systemd[1]: Stopped systemd-udevd.service. May 15 10:39:00.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.385484 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 10:39:00.385523 systemd[1]: Closed systemd-udevd-control.socket. May 15 10:39:00.387213 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 10:39:00.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.387249 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 10:39:00.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.389044 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 10:39:00.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.389092 systemd[1]: Stopped dracut-pre-udev.service. May 15 10:39:00.389883 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 10:39:00.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.389913 systemd[1]: Stopped dracut-cmdline.service. May 15 10:39:00.392278 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 10:39:00.392308 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 10:39:00.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.394431 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 10:39:00.395801 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 10:39:00.395838 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 10:39:00.400390 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 10:39:00.400452 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 10:39:00.409918 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 10:39:00.409995 systemd[1]: Stopped sysroot-boot.service. May 15 10:39:00.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.410996 systemd[1]: Reached target initrd-switch-root.target. May 15 10:39:00.413167 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 10:39:00.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:00.413225 systemd[1]: Stopped initrd-setup-root.service. May 15 10:39:00.414806 systemd[1]: Starting initrd-switch-root.service... May 15 10:39:00.430688 systemd[1]: Switching root. May 15 10:39:00.448832 iscsid[717]: iscsid shutting down. May 15 10:39:00.449634 systemd-journald[196]: Received SIGTERM from PID 1 (systemd). May 15 10:39:00.449671 systemd-journald[196]: Journal stopped May 15 10:39:03.975174 kernel: SELinux: Class mctp_socket not defined in policy. May 15 10:39:03.975214 kernel: SELinux: Class anon_inode not defined in policy. May 15 10:39:03.975230 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 10:39:03.975239 kernel: SELinux: policy capability network_peer_controls=1 May 15 10:39:03.975251 kernel: SELinux: policy capability open_perms=1 May 15 10:39:03.975264 kernel: SELinux: policy capability extended_socket_class=1 May 15 10:39:03.975274 kernel: SELinux: policy capability always_check_network=0 May 15 10:39:03.975285 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 10:39:03.975294 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 10:39:03.975303 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 10:39:03.975312 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 10:39:03.975323 systemd[1]: Successfully loaded SELinux policy in 38.827ms. May 15 10:39:03.975335 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.361ms. May 15 10:39:03.975347 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:39:03.975357 systemd[1]: Detected virtualization kvm. May 15 10:39:03.975372 systemd[1]: Detected architecture x86-64. May 15 10:39:03.975381 systemd[1]: Detected first boot. May 15 10:39:03.975391 systemd[1]: Initializing machine ID from VM UUID. May 15 10:39:03.975404 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 10:39:03.975413 systemd[1]: Populated /etc with preset unit settings. May 15 10:39:03.975424 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:39:03.975437 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:39:03.975448 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:39:03.975460 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 10:39:03.975470 systemd[1]: Stopped iscsiuio.service. May 15 10:39:03.975480 systemd[1]: iscsid.service: Deactivated successfully. May 15 10:39:03.975490 systemd[1]: Stopped iscsid.service. May 15 10:39:03.975500 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 10:39:03.975509 systemd[1]: Stopped initrd-switch-root.service. May 15 10:39:03.975519 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 10:39:03.975531 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 10:39:03.975543 systemd[1]: Created slice system-addon\x2drun.slice. May 15 10:39:03.975553 systemd[1]: Created slice system-getty.slice. May 15 10:39:03.975563 systemd[1]: Created slice system-modprobe.slice. May 15 10:39:03.975573 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 10:39:03.975583 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 10:39:03.975594 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 10:39:03.975605 systemd[1]: Created slice user.slice. May 15 10:39:03.975615 systemd[1]: Started systemd-ask-password-console.path. May 15 10:39:03.975625 systemd[1]: Started systemd-ask-password-wall.path. May 15 10:39:03.975635 systemd[1]: Set up automount boot.automount. May 15 10:39:03.975645 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 10:39:03.975655 systemd[1]: Stopped target initrd-switch-root.target. May 15 10:39:03.975673 systemd[1]: Stopped target initrd-fs.target. May 15 10:39:03.975683 systemd[1]: Stopped target initrd-root-fs.target. May 15 10:39:03.975694 systemd[1]: Reached target integritysetup.target. May 15 10:39:03.975705 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:39:03.975717 systemd[1]: Reached target remote-fs.target. May 15 10:39:03.975727 systemd[1]: Reached target slices.target. May 15 10:39:03.975737 systemd[1]: Reached target swap.target. May 15 10:39:03.975746 systemd[1]: Reached target torcx.target. May 15 10:39:03.975756 systemd[1]: Reached target veritysetup.target. May 15 10:39:03.975766 systemd[1]: Listening on systemd-coredump.socket. May 15 10:39:03.975776 systemd[1]: Listening on systemd-initctl.socket. May 15 10:39:03.975787 systemd[1]: Listening on systemd-networkd.socket. May 15 10:39:03.975797 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:39:03.975807 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:39:03.975818 systemd[1]: Listening on systemd-userdbd.socket. May 15 10:39:03.975828 systemd[1]: Mounting dev-hugepages.mount... May 15 10:39:03.975837 systemd[1]: Mounting dev-mqueue.mount... May 15 10:39:03.975847 systemd[1]: Mounting media.mount... May 15 10:39:03.975857 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:39:03.975867 systemd[1]: Mounting sys-kernel-debug.mount... May 15 10:39:03.975877 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 10:39:03.975888 systemd[1]: Mounting tmp.mount... May 15 10:39:03.975898 systemd[1]: Starting flatcar-tmpfiles.service... May 15 10:39:03.975908 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:39:03.975918 systemd[1]: Starting kmod-static-nodes.service... May 15 10:39:03.975928 systemd[1]: Starting modprobe@configfs.service... May 15 10:39:03.975938 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:39:03.975948 systemd[1]: Starting modprobe@drm.service... May 15 10:39:03.975957 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:39:03.975968 systemd[1]: Starting modprobe@fuse.service... May 15 10:39:03.975978 systemd[1]: Starting modprobe@loop.service... May 15 10:39:03.975988 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 10:39:03.975999 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 10:39:03.976008 systemd[1]: Stopped systemd-fsck-root.service. May 15 10:39:03.976018 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 10:39:03.976028 systemd[1]: Stopped systemd-fsck-usr.service. May 15 10:39:03.976038 systemd[1]: Stopped systemd-journald.service. May 15 10:39:03.976047 kernel: loop: module loaded May 15 10:39:03.976058 kernel: fuse: init (API version 7.34) May 15 10:39:03.976067 systemd[1]: Starting systemd-journald.service... May 15 10:39:03.976087 systemd[1]: Starting systemd-modules-load.service... May 15 10:39:03.976098 systemd[1]: Starting systemd-network-generator.service... May 15 10:39:03.976108 systemd[1]: Starting systemd-remount-fs.service... May 15 10:39:03.976117 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:39:03.976127 systemd[1]: verity-setup.service: Deactivated successfully. May 15 10:39:03.976139 systemd-journald[996]: Journal started May 15 10:39:03.976174 systemd-journald[996]: Runtime Journal (/run/log/journal/10d10b0462d042afa14e2f795b7de20c) is 6.0M, max 48.4M, 42.4M free. May 15 10:39:00.508000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 10:39:00.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:39:00.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:39:00.837000 audit: BPF prog-id=10 op=LOAD May 15 10:39:00.837000 audit: BPF prog-id=10 op=UNLOAD May 15 10:39:00.837000 audit: BPF prog-id=11 op=LOAD May 15 10:39:00.837000 audit: BPF prog-id=11 op=UNLOAD May 15 10:39:00.869000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 10:39:00.869000 audit[911]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001558a2 a1=c0000d8de0 a2=c0000e1040 a3=32 items=0 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:00.869000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:39:00.871000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 10:39:00.871000 audit[911]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000155979 a2=1ed a3=0 items=2 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:00.871000 audit: CWD cwd="/" May 15 10:39:00.871000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:00.871000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:00.871000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:39:03.845000 audit: BPF prog-id=12 op=LOAD May 15 10:39:03.845000 audit: BPF prog-id=3 op=UNLOAD May 15 10:39:03.845000 audit: BPF prog-id=13 op=LOAD May 15 10:39:03.845000 audit: BPF prog-id=14 op=LOAD May 15 10:39:03.845000 audit: BPF prog-id=4 op=UNLOAD May 15 10:39:03.845000 audit: BPF prog-id=5 op=UNLOAD May 15 10:39:03.846000 audit: BPF prog-id=15 op=LOAD May 15 10:39:03.846000 audit: BPF prog-id=12 op=UNLOAD May 15 10:39:03.846000 audit: BPF prog-id=16 op=LOAD May 15 10:39:03.846000 audit: BPF prog-id=17 op=LOAD May 15 10:39:03.846000 audit: BPF prog-id=13 op=UNLOAD May 15 10:39:03.846000 audit: BPF prog-id=14 op=UNLOAD May 15 10:39:03.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.857000 audit: BPF prog-id=15 op=UNLOAD May 15 10:39:03.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.959000 audit: BPF prog-id=18 op=LOAD May 15 10:39:03.959000 audit: BPF prog-id=19 op=LOAD May 15 10:39:03.959000 audit: BPF prog-id=20 op=LOAD May 15 10:39:03.959000 audit: BPF prog-id=16 op=UNLOAD May 15 10:39:03.959000 audit: BPF prog-id=17 op=UNLOAD May 15 10:39:03.974000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 10:39:03.974000 audit[996]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffcf75899e0 a2=4000 a3=7ffcf7589a7c items=0 ppid=1 pid=996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:03.974000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 10:39:00.868574 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:39:03.843404 systemd[1]: Queued start job for default target multi-user.target. May 15 10:39:00.868810 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:39:03.843414 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 10:39:00.868826 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:39:03.846878 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 10:39:00.868852 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:00Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 10:39:00.868861 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:00Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 10:39:03.977617 systemd[1]: Stopped verity-setup.service. May 15 10:39:00.868891 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:00Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 10:39:00.868902 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:00Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 10:39:00.869129 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:00Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 10:39:00.869163 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:39:00.869174 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:39:00.869458 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 10:39:00.869487 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 10:39:00.869503 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 May 15 10:39:00.869515 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 10:39:00.869528 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 May 15 10:39:00.869540 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 10:39:03.563856 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:03Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:39:03.564134 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:03Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:39:03.564242 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:03Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:39:03.564403 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:03Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:39:03.564457 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:03Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 10:39:03.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.564541 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T10:39:03Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 10:39:03.981098 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:39:03.984824 systemd[1]: Started systemd-journald.service. May 15 10:39:03.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.985587 systemd[1]: Mounted dev-hugepages.mount. May 15 10:39:03.986739 systemd[1]: Mounted dev-mqueue.mount. May 15 10:39:03.987833 systemd[1]: Mounted media.mount. May 15 10:39:03.988887 systemd[1]: Mounted sys-kernel-debug.mount. May 15 10:39:03.990104 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 10:39:03.991310 systemd[1]: Mounted tmp.mount. May 15 10:39:03.992312 systemd[1]: Finished flatcar-tmpfiles.service. May 15 10:39:03.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.993396 systemd[1]: Finished kmod-static-nodes.service. May 15 10:39:03.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.994460 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 10:39:03.994579 systemd[1]: Finished modprobe@configfs.service. May 15 10:39:03.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.995651 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:39:03.995792 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:39:03.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.996846 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:39:03.996955 systemd[1]: Finished modprobe@drm.service. May 15 10:39:03.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.997970 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:39:03.998073 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:39:03.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:03.999308 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 10:39:03.999418 systemd[1]: Finished modprobe@fuse.service. May 15 10:39:04.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.000434 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:39:04.000547 systemd[1]: Finished modprobe@loop.service. May 15 10:39:04.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.001710 systemd[1]: Finished systemd-modules-load.service. May 15 10:39:04.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.002875 systemd[1]: Finished systemd-network-generator.service. May 15 10:39:04.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.004110 systemd[1]: Finished systemd-remount-fs.service. May 15 10:39:04.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.005388 systemd[1]: Reached target network-pre.target. May 15 10:39:04.007247 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 10:39:04.020005 systemd[1]: Mounting sys-kernel-config.mount... May 15 10:39:04.020945 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 10:39:04.022605 systemd[1]: Starting systemd-hwdb-update.service... May 15 10:39:04.024383 systemd[1]: Starting systemd-journal-flush.service... May 15 10:39:04.025690 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:39:04.026907 systemd[1]: Starting systemd-random-seed.service... May 15 10:39:04.028945 systemd-journald[996]: Time spent on flushing to /var/log/journal/10d10b0462d042afa14e2f795b7de20c is 19.023ms for 1155 entries. May 15 10:39:04.028945 systemd-journald[996]: System Journal (/var/log/journal/10d10b0462d042afa14e2f795b7de20c) is 8.0M, max 195.6M, 187.6M free. May 15 10:39:04.067891 systemd-journald[996]: Received client request to flush runtime journal. May 15 10:39:04.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.028209 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:39:04.030330 systemd[1]: Starting systemd-sysctl.service... May 15 10:39:04.032849 systemd[1]: Starting systemd-sysusers.service... May 15 10:39:04.037816 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:39:04.069168 udevadm[1014]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 15 10:39:04.039565 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 10:39:04.040855 systemd[1]: Mounted sys-kernel-config.mount. May 15 10:39:04.042254 systemd[1]: Finished systemd-random-seed.service. May 15 10:39:04.043814 systemd[1]: Reached target first-boot-complete.target. May 15 10:39:04.046762 systemd[1]: Starting systemd-udev-settle.service... May 15 10:39:04.049694 systemd[1]: Finished systemd-sysusers.service. May 15 10:39:04.054523 systemd[1]: Finished systemd-sysctl.service. May 15 10:39:04.068595 systemd[1]: Finished systemd-journal-flush.service. May 15 10:39:04.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.561959 systemd[1]: Finished systemd-hwdb-update.service. May 15 10:39:04.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.563000 audit: BPF prog-id=21 op=LOAD May 15 10:39:04.563000 audit: BPF prog-id=22 op=LOAD May 15 10:39:04.563000 audit: BPF prog-id=7 op=UNLOAD May 15 10:39:04.563000 audit: BPF prog-id=8 op=UNLOAD May 15 10:39:04.564246 systemd[1]: Starting systemd-udevd.service... May 15 10:39:04.579789 systemd-udevd[1017]: Using default interface naming scheme 'v252'. May 15 10:39:04.592890 systemd[1]: Started systemd-udevd.service. May 15 10:39:04.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.594000 audit: BPF prog-id=23 op=LOAD May 15 10:39:04.595614 systemd[1]: Starting systemd-networkd.service... May 15 10:39:04.600000 audit: BPF prog-id=24 op=LOAD May 15 10:39:04.600000 audit: BPF prog-id=25 op=LOAD May 15 10:39:04.601000 audit: BPF prog-id=26 op=LOAD May 15 10:39:04.601586 systemd[1]: Starting systemd-userdbd.service... May 15 10:39:04.617498 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 10:39:04.642172 systemd[1]: Started systemd-userdbd.service. May 15 10:39:04.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.657881 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:39:04.677110 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 15 10:39:04.683119 kernel: ACPI: button: Power Button [PWRF] May 15 10:39:04.693357 systemd-networkd[1024]: lo: Link UP May 15 10:39:04.693364 systemd-networkd[1024]: lo: Gained carrier May 15 10:39:04.693725 systemd-networkd[1024]: Enumeration completed May 15 10:39:04.693823 systemd-networkd[1024]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:39:04.693871 systemd[1]: Started systemd-networkd.service. May 15 10:39:04.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.695209 systemd-networkd[1024]: eth0: Link UP May 15 10:39:04.695212 systemd-networkd[1024]: eth0: Gained carrier May 15 10:39:04.696000 audit[1018]: AVC avc: denied { confidentiality } for pid=1018 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 10:39:04.696000 audit[1018]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a907a9ffe0 a1=338ac a2=7faa0b430bc5 a3=5 items=110 ppid=1017 pid=1018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:04.696000 audit: CWD cwd="/" May 15 10:39:04.696000 audit: PATH item=0 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=1 name=(null) inode=14147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=2 name=(null) inode=14147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=3 name=(null) inode=14148 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=4 name=(null) inode=14147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=5 name=(null) inode=14149 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=6 name=(null) inode=14147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=7 name=(null) inode=14150 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=8 name=(null) inode=14150 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=9 name=(null) inode=14151 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=10 name=(null) inode=14150 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=11 name=(null) inode=14152 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=12 name=(null) inode=14150 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=13 name=(null) inode=14153 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=14 name=(null) inode=14150 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=15 name=(null) inode=14154 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=16 name=(null) inode=14150 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=17 name=(null) inode=14155 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=18 name=(null) inode=14147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=19 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=20 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=21 name=(null) inode=14157 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=22 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=23 name=(null) inode=14158 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=24 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=25 name=(null) inode=14159 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=26 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=27 name=(null) inode=14160 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=28 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=29 name=(null) inode=14161 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=30 name=(null) inode=14147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=31 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=32 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=33 name=(null) inode=14163 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=34 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=35 name=(null) inode=14164 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=36 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=37 name=(null) inode=14165 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=38 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=39 name=(null) inode=14166 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=40 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=41 name=(null) inode=14167 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=42 name=(null) inode=14147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=43 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=44 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=45 name=(null) inode=14169 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=46 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=47 name=(null) inode=14170 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=48 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=49 name=(null) inode=14171 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=50 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=51 name=(null) inode=14172 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=52 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=53 name=(null) inode=14173 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=54 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=55 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=56 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=57 name=(null) inode=14175 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=58 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=59 name=(null) inode=14176 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=60 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=61 name=(null) inode=14177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=62 name=(null) inode=14177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=63 name=(null) inode=14178 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=64 name=(null) inode=14177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=65 name=(null) inode=14179 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=66 name=(null) inode=14177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=67 name=(null) inode=14180 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=68 name=(null) inode=14177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=69 name=(null) inode=14181 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=70 name=(null) inode=14177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=71 name=(null) inode=14182 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=72 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=73 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=74 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=75 name=(null) inode=14184 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=76 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=77 name=(null) inode=14185 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=78 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=79 name=(null) inode=14186 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=80 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=81 name=(null) inode=14187 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=82 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=83 name=(null) inode=14188 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=84 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=85 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=86 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=87 name=(null) inode=14190 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=88 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=89 name=(null) inode=14191 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=90 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=91 name=(null) inode=14192 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=92 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=93 name=(null) inode=14193 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=94 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=95 name=(null) inode=14194 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=96 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=97 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=98 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=99 name=(null) inode=14196 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=100 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=101 name=(null) inode=14197 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=102 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=103 name=(null) inode=14198 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=104 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=105 name=(null) inode=14199 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=106 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=107 name=(null) inode=14200 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PATH item=109 name=(null) inode=14201 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:04.696000 audit: PROCTITLE proctitle="(udev-worker)" May 15 10:39:04.708260 systemd-networkd[1024]: eth0: DHCPv4 address 10.0.0.58/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:39:04.715251 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 15 10:39:04.718029 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 15 10:39:04.718206 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 15 10:39:04.718341 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 15 10:39:04.739100 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 15 10:39:04.752103 kernel: mousedev: PS/2 mouse device common for all mice May 15 10:39:04.783790 kernel: kvm: Nested Virtualization enabled May 15 10:39:04.783872 kernel: SVM: kvm: Nested Paging enabled May 15 10:39:04.783886 kernel: SVM: Virtual VMLOAD VMSAVE supported May 15 10:39:04.784641 kernel: SVM: Virtual GIF supported May 15 10:39:04.808106 kernel: EDAC MC: Ver: 3.0.0 May 15 10:39:04.833733 systemd[1]: Finished systemd-udev-settle.service. May 15 10:39:04.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.836230 systemd[1]: Starting lvm2-activation-early.service... May 15 10:39:04.845641 lvm[1053]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:39:04.884776 systemd[1]: Finished lvm2-activation-early.service. May 15 10:39:04.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.886034 systemd[1]: Reached target cryptsetup.target. May 15 10:39:04.888061 systemd[1]: Starting lvm2-activation.service... May 15 10:39:04.891299 lvm[1054]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:39:04.916602 systemd[1]: Finished lvm2-activation.service. May 15 10:39:04.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.917675 systemd[1]: Reached target local-fs-pre.target. May 15 10:39:04.918606 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 10:39:04.918635 systemd[1]: Reached target local-fs.target. May 15 10:39:04.919885 systemd[1]: Reached target machines.target. May 15 10:39:04.922038 systemd[1]: Starting ldconfig.service... May 15 10:39:04.923264 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:39:04.923314 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:39:04.924845 systemd[1]: Starting systemd-boot-update.service... May 15 10:39:04.927658 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 10:39:04.930017 systemd[1]: Starting systemd-machine-id-commit.service... May 15 10:39:04.932965 systemd[1]: Starting systemd-sysext.service... May 15 10:39:04.934561 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1056 (bootctl) May 15 10:39:04.935581 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 10:39:04.945765 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 10:39:04.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.948427 systemd[1]: Unmounting usr-share-oem.mount... May 15 10:39:04.952791 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 10:39:04.953041 systemd[1]: Unmounted usr-share-oem.mount. May 15 10:39:04.963105 kernel: loop0: detected capacity change from 0 to 210664 May 15 10:39:04.980966 systemd-fsck[1063]: fsck.fat 4.2 (2021-01-31) May 15 10:39:04.980966 systemd-fsck[1063]: /dev/vda1: 791 files, 120752/258078 clusters May 15 10:39:04.982733 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 10:39:04.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:04.986495 systemd[1]: Mounting boot.mount... May 15 10:39:05.154758 systemd[1]: Mounted boot.mount. May 15 10:39:05.162137 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 10:39:05.172764 systemd[1]: Finished systemd-boot-update.service. May 15 10:39:05.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.180124 kernel: loop1: detected capacity change from 0 to 210664 May 15 10:39:05.190513 (sd-sysext)[1069]: Using extensions 'kubernetes'. May 15 10:39:05.191215 (sd-sysext)[1069]: Merged extensions into '/usr'. May 15 10:39:05.191231 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 10:39:05.192673 systemd[1]: Finished systemd-machine-id-commit.service. May 15 10:39:05.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.207679 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:39:05.208964 systemd[1]: Mounting usr-share-oem.mount... May 15 10:39:05.209968 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:39:05.211015 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:39:05.212912 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:39:05.214775 systemd[1]: Starting modprobe@loop.service... May 15 10:39:05.215907 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:39:05.216116 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:39:05.216263 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:39:05.217377 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:39:05.217531 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:39:05.222113 kernel: kauditd_printk_skb: 228 callbacks suppressed May 15 10:39:05.222182 kernel: audit: type=1130 audit(1747305545.218:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.221200 systemd[1]: Mounted usr-share-oem.mount. May 15 10:39:05.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.226967 kernel: audit: type=1131 audit(1747305545.218:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.228442 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:39:05.228586 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:39:05.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.230156 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:39:05.230257 systemd[1]: Finished modprobe@loop.service. May 15 10:39:05.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.234119 kernel: audit: type=1130 audit(1747305545.229:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.234163 kernel: audit: type=1131 audit(1747305545.229:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.243312 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:39:05.243355 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:39:05.243674 systemd[1]: Finished systemd-sysext.service. May 15 10:39:05.245816 kernel: audit: type=1130 audit(1747305545.238:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.245864 kernel: audit: type=1131 audit(1747305545.238:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.247929 systemd[1]: Starting ensure-sysext.service... May 15 10:39:05.251096 kernel: audit: type=1130 audit(1747305545.246:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.251989 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 10:39:05.256843 systemd[1]: Reloading. May 15 10:39:05.305226 ldconfig[1055]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 10:39:05.310842 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 10:39:05.313207 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 10:39:05.316454 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-05-15T10:39:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:39:05.316711 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-05-15T10:39:05Z" level=info msg="torcx already run" May 15 10:39:05.319829 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 10:39:05.382795 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:39:05.382816 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:39:05.400447 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:39:05.454000 audit: BPF prog-id=27 op=LOAD May 15 10:39:05.454000 audit: BPF prog-id=23 op=UNLOAD May 15 10:39:05.456629 kernel: audit: type=1334 audit(1747305545.454:161): prog-id=27 op=LOAD May 15 10:39:05.456693 kernel: audit: type=1334 audit(1747305545.454:162): prog-id=23 op=UNLOAD May 15 10:39:05.456719 kernel: audit: type=1334 audit(1747305545.455:163): prog-id=28 op=LOAD May 15 10:39:05.455000 audit: BPF prog-id=28 op=LOAD May 15 10:39:05.457000 audit: BPF prog-id=29 op=LOAD May 15 10:39:05.457000 audit: BPF prog-id=21 op=UNLOAD May 15 10:39:05.457000 audit: BPF prog-id=22 op=UNLOAD May 15 10:39:05.458000 audit: BPF prog-id=30 op=LOAD May 15 10:39:05.458000 audit: BPF prog-id=24 op=UNLOAD May 15 10:39:05.458000 audit: BPF prog-id=31 op=LOAD May 15 10:39:05.458000 audit: BPF prog-id=32 op=LOAD May 15 10:39:05.458000 audit: BPF prog-id=25 op=UNLOAD May 15 10:39:05.458000 audit: BPF prog-id=26 op=UNLOAD May 15 10:39:05.459000 audit: BPF prog-id=33 op=LOAD May 15 10:39:05.459000 audit: BPF prog-id=18 op=UNLOAD May 15 10:39:05.459000 audit: BPF prog-id=34 op=LOAD May 15 10:39:05.459000 audit: BPF prog-id=35 op=LOAD May 15 10:39:05.459000 audit: BPF prog-id=19 op=UNLOAD May 15 10:39:05.459000 audit: BPF prog-id=20 op=UNLOAD May 15 10:39:05.462113 systemd[1]: Finished ldconfig.service. May 15 10:39:05.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.464206 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 10:39:05.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.468604 systemd[1]: Starting audit-rules.service... May 15 10:39:05.470562 systemd[1]: Starting clean-ca-certificates.service... May 15 10:39:05.472843 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 10:39:05.474000 audit: BPF prog-id=36 op=LOAD May 15 10:39:05.475581 systemd[1]: Starting systemd-resolved.service... May 15 10:39:05.477000 audit: BPF prog-id=37 op=LOAD May 15 10:39:05.478540 systemd[1]: Starting systemd-timesyncd.service... May 15 10:39:05.480603 systemd[1]: Starting systemd-update-utmp.service... May 15 10:39:05.482206 systemd[1]: Finished clean-ca-certificates.service. May 15 10:39:05.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:05.485000 audit[1149]: SYSTEM_BOOT pid=1149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 10:39:05.496062 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:39:05.496340 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:39:05.498261 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:39:05.500683 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:39:05.501000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 10:39:05.501000 audit[1159]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe71f5a880 a2=420 a3=0 items=0 ppid=1138 pid=1159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:05.501000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 10:39:05.501923 augenrules[1159]: No rules May 15 10:39:05.502749 systemd[1]: Starting modprobe@loop.service... May 15 10:39:05.503745 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:39:05.503955 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:39:05.504244 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:39:05.504370 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:39:05.505885 systemd[1]: Finished audit-rules.service. May 15 10:39:05.507774 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 10:39:05.509818 systemd[1]: Finished systemd-update-utmp.service. May 15 10:39:05.511643 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:39:05.511816 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:39:05.513401 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:39:05.513539 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:39:05.515200 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:39:05.515352 systemd[1]: Finished modprobe@loop.service. May 15 10:39:05.519520 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:39:05.519782 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:39:05.521494 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:39:05.524037 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:39:05.526275 systemd[1]: Starting modprobe@loop.service... May 15 10:39:05.527425 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:39:05.527553 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:39:05.529052 systemd[1]: Starting systemd-update-done.service... May 15 10:39:05.530191 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:39:05.530303 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:39:05.531527 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:39:05.531681 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:39:05.533462 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:39:05.533600 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:39:05.535238 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:39:05.535374 systemd[1]: Finished modprobe@loop.service. May 15 10:39:05.539700 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:39:05.539973 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:39:05.542536 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:39:05.544904 systemd[1]: Starting modprobe@drm.service... May 15 10:39:05.547094 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:39:05.549296 systemd[1]: Starting modprobe@loop.service... May 15 10:39:05.550448 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:39:05.550610 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:39:05.551936 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 10:39:05.553401 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:39:05.553527 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:39:05.554968 systemd[1]: Finished systemd-update-done.service. May 15 10:39:06.347240 systemd-timesyncd[1148]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 15 10:39:06.347466 systemd-timesyncd[1148]: Initial clock synchronization to Thu 2025-05-15 10:39:06.347168 UTC. May 15 10:39:06.347631 systemd[1]: Started systemd-timesyncd.service. May 15 10:39:06.348013 systemd-resolved[1142]: Positive Trust Anchors: May 15 10:39:06.348025 systemd-resolved[1142]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:39:06.348052 systemd-resolved[1142]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:39:06.349581 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:39:06.349741 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:39:06.351585 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:39:06.351731 systemd[1]: Finished modprobe@drm.service. May 15 10:39:06.353407 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:39:06.353547 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:39:06.355299 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:39:06.355428 systemd[1]: Finished modprobe@loop.service. May 15 10:39:06.356955 systemd-resolved[1142]: Defaulting to hostname 'linux'. May 15 10:39:06.357391 systemd[1]: Reached target time-set.target. May 15 10:39:06.358602 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:39:06.358647 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:39:06.358782 systemd[1]: Started systemd-resolved.service. May 15 10:39:06.360190 systemd[1]: Finished ensure-sysext.service. May 15 10:39:06.362147 systemd[1]: Reached target network.target. May 15 10:39:06.363285 systemd[1]: Reached target nss-lookup.target. May 15 10:39:06.364378 systemd[1]: Reached target sysinit.target. May 15 10:39:06.365462 systemd[1]: Started motdgen.path. May 15 10:39:06.366504 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 10:39:06.368067 systemd[1]: Started logrotate.timer. May 15 10:39:06.369168 systemd[1]: Started mdadm.timer. May 15 10:39:06.370079 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 10:39:06.371149 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 10:39:06.371179 systemd[1]: Reached target paths.target. May 15 10:39:06.372152 systemd[1]: Reached target timers.target. May 15 10:39:06.373531 systemd[1]: Listening on dbus.socket. May 15 10:39:06.375300 systemd[1]: Starting docker.socket... May 15 10:39:06.378694 systemd[1]: Listening on sshd.socket. May 15 10:39:06.379800 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:39:06.380243 systemd[1]: Listening on docker.socket. May 15 10:39:06.381289 systemd[1]: Reached target sockets.target. May 15 10:39:06.382301 systemd[1]: Reached target basic.target. May 15 10:39:06.383371 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:39:06.383402 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:39:06.384535 systemd[1]: Starting containerd.service... May 15 10:39:06.386160 systemd[1]: Starting dbus.service... May 15 10:39:06.387889 systemd[1]: Starting enable-oem-cloudinit.service... May 15 10:39:06.390047 systemd[1]: Starting extend-filesystems.service... May 15 10:39:06.391276 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 10:39:06.391979 jq[1180]: false May 15 10:39:06.392363 systemd[1]: Starting motdgen.service... May 15 10:39:06.394797 systemd[1]: Starting prepare-helm.service... May 15 10:39:06.396778 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 10:39:06.399276 systemd[1]: Starting sshd-keygen.service... May 15 10:39:06.403213 systemd[1]: Starting systemd-logind.service... May 15 10:39:06.404443 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:39:06.404493 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 10:39:06.405424 dbus-daemon[1179]: [system] SELinux support is enabled May 15 10:39:06.405931 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 10:39:06.407544 systemd[1]: Starting update-engine.service... May 15 10:39:06.409478 extend-filesystems[1181]: Found loop1 May 15 10:39:06.410633 extend-filesystems[1181]: Found sr0 May 15 10:39:06.410633 extend-filesystems[1181]: Found vda May 15 10:39:06.410633 extend-filesystems[1181]: Found vda1 May 15 10:39:06.410633 extend-filesystems[1181]: Found vda2 May 15 10:39:06.410633 extend-filesystems[1181]: Found vda3 May 15 10:39:06.410633 extend-filesystems[1181]: Found usr May 15 10:39:06.410633 extend-filesystems[1181]: Found vda4 May 15 10:39:06.410633 extend-filesystems[1181]: Found vda6 May 15 10:39:06.410633 extend-filesystems[1181]: Found vda7 May 15 10:39:06.410633 extend-filesystems[1181]: Found vda9 May 15 10:39:06.410633 extend-filesystems[1181]: Checking size of /dev/vda9 May 15 10:39:06.411979 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 10:39:06.415362 jq[1199]: true May 15 10:39:06.422575 systemd[1]: Started dbus.service. May 15 10:39:06.426499 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 10:39:06.426648 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 10:39:06.426919 systemd[1]: motdgen.service: Deactivated successfully. May 15 10:39:06.427037 systemd[1]: Finished motdgen.service. May 15 10:39:06.428978 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 10:39:06.429155 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 10:39:06.434854 jq[1204]: true May 15 10:39:06.438054 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 10:39:06.438082 systemd[1]: Reached target system-config.target. May 15 10:39:06.440481 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 10:39:06.440506 systemd[1]: Reached target user-config.target. May 15 10:39:06.442069 extend-filesystems[1181]: Resized partition /dev/vda9 May 15 10:39:06.443901 tar[1203]: linux-amd64/helm May 15 10:39:06.445121 extend-filesystems[1214]: resize2fs 1.46.5 (30-Dec-2021) May 15 10:39:06.448669 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 15 10:39:06.524294 update_engine[1197]: I0515 10:39:06.523852 1197 main.cc:92] Flatcar Update Engine starting May 15 10:39:06.529570 systemd[1]: Started update-engine.service. May 15 10:39:06.532454 systemd[1]: Started locksmithd.service. May 15 10:39:06.535737 update_engine[1197]: I0515 10:39:06.535699 1197 update_check_scheduler.cc:74] Next update check in 2m23s May 15 10:39:06.536296 systemd-logind[1195]: Watching system buttons on /dev/input/event1 (Power Button) May 15 10:39:06.536315 systemd-logind[1195]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 10:39:06.536729 systemd-logind[1195]: New seat seat0. May 15 10:39:06.538144 systemd[1]: Started systemd-logind.service. May 15 10:39:06.547673 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 15 10:39:06.593434 env[1205]: time="2025-05-15T10:39:06.592831437Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 10:39:06.597188 extend-filesystems[1214]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 10:39:06.597188 extend-filesystems[1214]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 10:39:06.597188 extend-filesystems[1214]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 15 10:39:06.606826 extend-filesystems[1181]: Resized filesystem in /dev/vda9 May 15 10:39:06.600695 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 10:39:06.600823 systemd[1]: Finished extend-filesystems.service. May 15 10:39:06.610789 env[1205]: time="2025-05-15T10:39:06.610748003Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 10:39:06.610929 env[1205]: time="2025-05-15T10:39:06.610908223Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 10:39:06.612249 env[1205]: time="2025-05-15T10:39:06.612216838Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 10:39:06.612249 env[1205]: time="2025-05-15T10:39:06.612245462Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 10:39:06.612481 env[1205]: time="2025-05-15T10:39:06.612456808Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:39:06.612481 env[1205]: time="2025-05-15T10:39:06.612475664Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 10:39:06.612566 env[1205]: time="2025-05-15T10:39:06.612487075Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 10:39:06.612566 env[1205]: time="2025-05-15T10:39:06.612495491Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 10:39:06.612566 env[1205]: time="2025-05-15T10:39:06.612551676Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 10:39:06.612781 bash[1228]: Updated "/home/core/.ssh/authorized_keys" May 15 10:39:06.612990 env[1205]: time="2025-05-15T10:39:06.612766880Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 10:39:06.612990 env[1205]: time="2025-05-15T10:39:06.612888828Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:39:06.612990 env[1205]: time="2025-05-15T10:39:06.612902725Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 10:39:06.612990 env[1205]: time="2025-05-15T10:39:06.612941718Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 10:39:06.612990 env[1205]: time="2025-05-15T10:39:06.612952067Z" level=info msg="metadata content store policy set" policy=shared May 15 10:39:06.613632 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 10:39:06.619126 env[1205]: time="2025-05-15T10:39:06.619097945Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 10:39:06.619193 env[1205]: time="2025-05-15T10:39:06.619131328Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 10:39:06.619193 env[1205]: time="2025-05-15T10:39:06.619144041Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 10:39:06.619193 env[1205]: time="2025-05-15T10:39:06.619185109Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 10:39:06.619288 env[1205]: time="2025-05-15T10:39:06.619208843Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 10:39:06.619288 env[1205]: time="2025-05-15T10:39:06.619221747Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 10:39:06.619288 env[1205]: time="2025-05-15T10:39:06.619275067Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 10:39:06.619362 env[1205]: time="2025-05-15T10:39:06.619307007Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 10:39:06.619362 env[1205]: time="2025-05-15T10:39:06.619319150Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 10:39:06.619362 env[1205]: time="2025-05-15T10:39:06.619332174Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 10:39:06.619362 env[1205]: time="2025-05-15T10:39:06.619343836Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 10:39:06.619362 env[1205]: time="2025-05-15T10:39:06.619356099Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 10:39:06.619481 env[1205]: time="2025-05-15T10:39:06.619441169Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 10:39:06.619531 env[1205]: time="2025-05-15T10:39:06.619510920Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 10:39:06.619782 env[1205]: time="2025-05-15T10:39:06.619760438Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 10:39:06.619825 env[1205]: time="2025-05-15T10:39:06.619791967Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 10:39:06.619825 env[1205]: time="2025-05-15T10:39:06.619804320Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 10:39:06.619863 env[1205]: time="2025-05-15T10:39:06.619849625Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 10:39:06.619883 env[1205]: time="2025-05-15T10:39:06.619870654Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 10:39:06.619909 env[1205]: time="2025-05-15T10:39:06.619881895Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 10:39:06.619909 env[1205]: time="2025-05-15T10:39:06.619891704Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 10:39:06.619909 env[1205]: time="2025-05-15T10:39:06.619902324Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 10:39:06.619968 env[1205]: time="2025-05-15T10:39:06.619912944Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 10:39:06.619968 env[1205]: time="2025-05-15T10:39:06.619924586Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 10:39:06.619968 env[1205]: time="2025-05-15T10:39:06.619941688Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 10:39:06.619968 env[1205]: time="2025-05-15T10:39:06.619954231Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 10:39:06.620143 env[1205]: time="2025-05-15T10:39:06.620123719Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 10:39:06.620143 env[1205]: time="2025-05-15T10:39:06.620142364Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 10:39:06.620215 env[1205]: time="2025-05-15T10:39:06.620152523Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 10:39:06.620215 env[1205]: time="2025-05-15T10:39:06.620164646Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 10:39:06.620215 env[1205]: time="2025-05-15T10:39:06.620189913Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 10:39:06.620215 env[1205]: time="2025-05-15T10:39:06.620208989Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 10:39:06.620306 env[1205]: time="2025-05-15T10:39:06.620239526Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 10:39:06.620306 env[1205]: time="2025-05-15T10:39:06.620290812Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 10:39:06.620554 env[1205]: time="2025-05-15T10:39:06.620504914Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 10:39:06.623106 env[1205]: time="2025-05-15T10:39:06.620572030Z" level=info msg="Connect containerd service" May 15 10:39:06.623106 env[1205]: time="2025-05-15T10:39:06.620605703Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 10:39:06.623106 env[1205]: time="2025-05-15T10:39:06.621299254Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:39:06.623106 env[1205]: time="2025-05-15T10:39:06.621414831Z" level=info msg="Start subscribing containerd event" May 15 10:39:06.623106 env[1205]: time="2025-05-15T10:39:06.621473831Z" level=info msg="Start recovering state" May 15 10:39:06.623106 env[1205]: time="2025-05-15T10:39:06.621520118Z" level=info msg="Start event monitor" May 15 10:39:06.623106 env[1205]: time="2025-05-15T10:39:06.621528173Z" level=info msg="Start snapshots syncer" May 15 10:39:06.623106 env[1205]: time="2025-05-15T10:39:06.621535227Z" level=info msg="Start cni network conf syncer for default" May 15 10:39:06.623106 env[1205]: time="2025-05-15T10:39:06.621542310Z" level=info msg="Start streaming server" May 15 10:39:06.623106 env[1205]: time="2025-05-15T10:39:06.621904259Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 10:39:06.623106 env[1205]: time="2025-05-15T10:39:06.621938193Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 10:39:06.622069 systemd[1]: Started containerd.service. May 15 10:39:06.623529 env[1205]: time="2025-05-15T10:39:06.623511724Z" level=info msg="containerd successfully booted in 0.031417s" May 15 10:39:06.643532 locksmithd[1231]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 10:39:06.708842 systemd-networkd[1024]: eth0: Gained IPv6LL May 15 10:39:06.711813 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 10:39:06.713226 systemd[1]: Reached target network-online.target. May 15 10:39:06.716570 systemd[1]: Starting kubelet.service... May 15 10:39:07.181722 tar[1203]: linux-amd64/LICENSE May 15 10:39:07.181858 tar[1203]: linux-amd64/README.md May 15 10:39:07.185629 systemd[1]: Finished prepare-helm.service. May 15 10:39:07.638412 systemd[1]: Started kubelet.service. May 15 10:39:07.832543 sshd_keygen[1201]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 10:39:07.855693 systemd[1]: Finished sshd-keygen.service. May 15 10:39:07.858399 systemd[1]: Starting issuegen.service... May 15 10:39:07.863411 systemd[1]: issuegen.service: Deactivated successfully. May 15 10:39:07.863579 systemd[1]: Finished issuegen.service. May 15 10:39:07.865743 systemd[1]: Starting systemd-user-sessions.service... May 15 10:39:07.874228 systemd[1]: Finished systemd-user-sessions.service. May 15 10:39:07.883142 systemd[1]: Started getty@tty1.service. May 15 10:39:07.885115 systemd[1]: Started serial-getty@ttyS0.service. May 15 10:39:07.886352 systemd[1]: Reached target getty.target. May 15 10:39:07.887347 systemd[1]: Reached target multi-user.target. May 15 10:39:07.889311 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 10:39:07.896612 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 10:39:07.896783 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 10:39:07.898045 systemd[1]: Startup finished in 598ms (kernel) + 4.768s (initrd) + 6.639s (userspace) = 12.006s. May 15 10:39:08.225616 kubelet[1250]: E0515 10:39:08.225486 1250 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:39:08.227079 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:39:08.227244 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:39:08.227497 systemd[1]: kubelet.service: Consumed 1.386s CPU time. May 15 10:39:09.641341 systemd[1]: Created slice system-sshd.slice. May 15 10:39:09.643024 systemd[1]: Started sshd@0-10.0.0.58:22-10.0.0.1:54098.service. May 15 10:39:09.681685 sshd[1273]: Accepted publickey for core from 10.0.0.1 port 54098 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:09.683430 sshd[1273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:09.692094 systemd[1]: Created slice user-500.slice. May 15 10:39:09.693357 systemd[1]: Starting user-runtime-dir@500.service... May 15 10:39:09.695016 systemd-logind[1195]: New session 1 of user core. May 15 10:39:09.705586 systemd[1]: Finished user-runtime-dir@500.service. May 15 10:39:09.706809 systemd[1]: Starting user@500.service... May 15 10:39:09.710101 (systemd)[1276]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:09.786483 systemd[1276]: Queued start job for default target default.target. May 15 10:39:09.786915 systemd[1276]: Reached target paths.target. May 15 10:39:09.786935 systemd[1276]: Reached target sockets.target. May 15 10:39:09.786948 systemd[1276]: Reached target timers.target. May 15 10:39:09.786958 systemd[1276]: Reached target basic.target. May 15 10:39:09.786993 systemd[1276]: Reached target default.target. May 15 10:39:09.787012 systemd[1276]: Startup finished in 61ms. May 15 10:39:09.787101 systemd[1]: Started user@500.service. May 15 10:39:09.788000 systemd[1]: Started session-1.scope. May 15 10:39:09.839364 systemd[1]: Started sshd@1-10.0.0.58:22-10.0.0.1:54114.service. May 15 10:39:09.872313 sshd[1285]: Accepted publickey for core from 10.0.0.1 port 54114 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:09.873435 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:09.877219 systemd-logind[1195]: New session 2 of user core. May 15 10:39:09.878337 systemd[1]: Started session-2.scope. May 15 10:39:09.932980 sshd[1285]: pam_unix(sshd:session): session closed for user core May 15 10:39:09.935253 systemd[1]: sshd@1-10.0.0.58:22-10.0.0.1:54114.service: Deactivated successfully. May 15 10:39:09.935741 systemd[1]: session-2.scope: Deactivated successfully. May 15 10:39:09.936189 systemd-logind[1195]: Session 2 logged out. Waiting for processes to exit. May 15 10:39:09.936934 systemd[1]: Started sshd@2-10.0.0.58:22-10.0.0.1:54122.service. May 15 10:39:09.937488 systemd-logind[1195]: Removed session 2. May 15 10:39:09.968504 sshd[1291]: Accepted publickey for core from 10.0.0.1 port 54122 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:09.969493 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:09.972169 systemd-logind[1195]: New session 3 of user core. May 15 10:39:09.972824 systemd[1]: Started session-3.scope. May 15 10:39:10.021265 sshd[1291]: pam_unix(sshd:session): session closed for user core May 15 10:39:10.023646 systemd[1]: sshd@2-10.0.0.58:22-10.0.0.1:54122.service: Deactivated successfully. May 15 10:39:10.024160 systemd[1]: session-3.scope: Deactivated successfully. May 15 10:39:10.024596 systemd-logind[1195]: Session 3 logged out. Waiting for processes to exit. May 15 10:39:10.025727 systemd[1]: Started sshd@3-10.0.0.58:22-10.0.0.1:54130.service. May 15 10:39:10.026407 systemd-logind[1195]: Removed session 3. May 15 10:39:10.057096 sshd[1297]: Accepted publickey for core from 10.0.0.1 port 54130 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:10.057960 sshd[1297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:10.061093 systemd-logind[1195]: New session 4 of user core. May 15 10:39:10.061964 systemd[1]: Started session-4.scope. May 15 10:39:10.114897 sshd[1297]: pam_unix(sshd:session): session closed for user core May 15 10:39:10.117598 systemd[1]: sshd@3-10.0.0.58:22-10.0.0.1:54130.service: Deactivated successfully. May 15 10:39:10.118066 systemd[1]: session-4.scope: Deactivated successfully. May 15 10:39:10.118482 systemd-logind[1195]: Session 4 logged out. Waiting for processes to exit. May 15 10:39:10.119427 systemd[1]: Started sshd@4-10.0.0.58:22-10.0.0.1:54134.service. May 15 10:39:10.119989 systemd-logind[1195]: Removed session 4. May 15 10:39:10.150219 sshd[1303]: Accepted publickey for core from 10.0.0.1 port 54134 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:10.151167 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:10.153972 systemd-logind[1195]: New session 5 of user core. May 15 10:39:10.154726 systemd[1]: Started session-5.scope. May 15 10:39:10.208068 sudo[1306]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 10:39:10.208250 sudo[1306]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:39:10.216877 dbus-daemon[1179]: ЍA\xf0'V: received setenforce notice (enforcing=-746439184) May 15 10:39:10.218594 sudo[1306]: pam_unix(sudo:session): session closed for user root May 15 10:39:10.219896 sshd[1303]: pam_unix(sshd:session): session closed for user core May 15 10:39:10.222447 systemd[1]: sshd@4-10.0.0.58:22-10.0.0.1:54134.service: Deactivated successfully. May 15 10:39:10.222909 systemd[1]: session-5.scope: Deactivated successfully. May 15 10:39:10.223356 systemd-logind[1195]: Session 5 logged out. Waiting for processes to exit. May 15 10:39:10.224194 systemd[1]: Started sshd@5-10.0.0.58:22-10.0.0.1:54148.service. May 15 10:39:10.224838 systemd-logind[1195]: Removed session 5. May 15 10:39:10.254393 sshd[1310]: Accepted publickey for core from 10.0.0.1 port 54148 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:10.255733 sshd[1310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:10.258814 systemd-logind[1195]: New session 6 of user core. May 15 10:39:10.259483 systemd[1]: Started session-6.scope. May 15 10:39:10.313213 sudo[1314]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 10:39:10.313411 sudo[1314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:39:10.315727 sudo[1314]: pam_unix(sudo:session): session closed for user root May 15 10:39:10.320896 sudo[1313]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 10:39:10.321124 sudo[1313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:39:10.328369 systemd[1]: Stopping audit-rules.service... May 15 10:39:10.329000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:39:10.329000 audit[1317]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeb94dbba0 a2=420 a3=0 items=0 ppid=1 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:10.329000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 10:39:10.330092 auditctl[1317]: No rules May 15 10:39:10.330297 systemd[1]: audit-rules.service: Deactivated successfully. May 15 10:39:10.330418 systemd[1]: Stopped audit-rules.service. May 15 10:39:10.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:10.331581 systemd[1]: Starting audit-rules.service... May 15 10:39:10.347637 augenrules[1334]: No rules May 15 10:39:10.348452 systemd[1]: Finished audit-rules.service. May 15 10:39:10.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:10.349284 sudo[1313]: pam_unix(sudo:session): session closed for user root May 15 10:39:10.348000 audit[1313]: USER_END pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:39:10.348000 audit[1313]: CRED_DISP pid=1313 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:39:10.350458 sshd[1310]: pam_unix(sshd:session): session closed for user core May 15 10:39:10.350000 audit[1310]: USER_END pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:10.350000 audit[1310]: CRED_DISP pid=1310 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:10.353491 systemd[1]: sshd@5-10.0.0.58:22-10.0.0.1:54148.service: Deactivated successfully. May 15 10:39:10.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.58:22-10.0.0.1:54148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:10.354132 systemd[1]: session-6.scope: Deactivated successfully. May 15 10:39:10.354690 systemd-logind[1195]: Session 6 logged out. Waiting for processes to exit. May 15 10:39:10.355702 systemd[1]: Started sshd@6-10.0.0.58:22-10.0.0.1:54160.service. May 15 10:39:10.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.58:22-10.0.0.1:54160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:10.356373 systemd-logind[1195]: Removed session 6. May 15 10:39:10.388000 audit[1340]: USER_ACCT pid=1340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:10.389278 sshd[1340]: Accepted publickey for core from 10.0.0.1 port 54160 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:10.389000 audit[1340]: CRED_ACQ pid=1340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:10.389000 audit[1340]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd29c147e0 a2=3 a3=0 items=0 ppid=1 pid=1340 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:10.389000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:10.390337 sshd[1340]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:10.393624 systemd-logind[1195]: New session 7 of user core. May 15 10:39:10.394322 systemd[1]: Started session-7.scope. May 15 10:39:10.396000 audit[1340]: USER_START pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:10.397000 audit[1342]: CRED_ACQ pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:10.448000 audit[1343]: USER_ACCT pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:39:10.448774 sudo[1343]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 10:39:10.448000 audit[1343]: CRED_REFR pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:39:10.449047 sudo[1343]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:39:10.451000 audit[1343]: USER_START pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:39:10.535775 systemd[1]: Starting docker.service... May 15 10:39:10.583253 env[1355]: time="2025-05-15T10:39:10.583201951Z" level=info msg="Starting up" May 15 10:39:10.584367 env[1355]: time="2025-05-15T10:39:10.584326951Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:39:10.584367 env[1355]: time="2025-05-15T10:39:10.584344143Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:39:10.584367 env[1355]: time="2025-05-15T10:39:10.584361636Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:39:10.584465 env[1355]: time="2025-05-15T10:39:10.584373198Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:39:10.586785 env[1355]: time="2025-05-15T10:39:10.586758622Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:39:10.586785 env[1355]: time="2025-05-15T10:39:10.586776897Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:39:10.586850 env[1355]: time="2025-05-15T10:39:10.586787286Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:39:10.586850 env[1355]: time="2025-05-15T10:39:10.586795441Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:39:10.592105 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2116066420-merged.mount: Deactivated successfully. May 15 10:39:11.109739 env[1355]: time="2025-05-15T10:39:11.109684893Z" level=info msg="Loading containers: start." May 15 10:39:11.158000 audit[1389]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.161970 kernel: kauditd_printk_skb: 45 callbacks suppressed May 15 10:39:11.162088 kernel: audit: type=1325 audit(1747305551.158:203): table=nat:2 family=2 entries=2 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.162113 kernel: audit: type=1300 audit(1747305551.158:203): arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd3e717f30 a2=0 a3=7ffd3e717f1c items=0 ppid=1355 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.158000 audit[1389]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd3e717f30 a2=0 a3=7ffd3e717f1c items=0 ppid=1355 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.158000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 15 10:39:11.169140 kernel: audit: type=1327 audit(1747305551.158:203): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 15 10:39:11.169177 kernel: audit: type=1325 audit(1747305551.159:204): table=filter:3 family=2 entries=2 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.159000 audit[1391]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.171506 kernel: audit: type=1300 audit(1747305551.159:204): arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff165dc080 a2=0 a3=7fff165dc06c items=0 ppid=1355 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.159000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff165dc080 a2=0 a3=7fff165dc06c items=0 ppid=1355 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.159000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 15 10:39:11.178780 kernel: audit: type=1327 audit(1747305551.159:204): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 15 10:39:11.178816 kernel: audit: type=1325 audit(1747305551.161:205): table=filter:4 family=2 entries=1 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.161000 audit[1393]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.161000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff48d126d0 a2=0 a3=7fff48d126bc items=0 ppid=1355 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.186618 kernel: audit: type=1300 audit(1747305551.161:205): arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff48d126d0 a2=0 a3=7fff48d126bc items=0 ppid=1355 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.186775 kernel: audit: type=1327 audit(1747305551.161:205): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:39:11.161000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:39:11.189262 kernel: audit: type=1325 audit(1747305551.162:206): table=filter:5 family=2 entries=1 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.162000 audit[1395]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.162000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdcc8de910 a2=0 a3=7ffdcc8de8fc items=0 ppid=1355 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.162000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:39:11.164000 audit[1397]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.164000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc5ae6deb0 a2=0 a3=7ffc5ae6de9c items=0 ppid=1355 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.164000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 15 10:39:11.212000 audit[1402]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.212000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff62d66820 a2=0 a3=7fff62d6680c items=0 ppid=1355 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.212000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 15 10:39:11.220000 audit[1404]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.220000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcf3fc3490 a2=0 a3=7ffcf3fc347c items=0 ppid=1355 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.220000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 15 10:39:11.222000 audit[1406]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.222000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff9e2ccdd0 a2=0 a3=7fff9e2ccdbc items=0 ppid=1355 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.222000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 15 10:39:11.224000 audit[1408]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.224000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe7f3ed200 a2=0 a3=7ffe7f3ed1ec items=0 ppid=1355 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.224000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:39:11.233000 audit[1412]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.233000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffe5c0bf50 a2=0 a3=7fffe5c0bf3c items=0 ppid=1355 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.233000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:39:11.237000 audit[1413]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.237000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdec08d040 a2=0 a3=7ffdec08d02c items=0 ppid=1355 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.237000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:39:11.246672 kernel: Initializing XFRM netlink socket May 15 10:39:11.273295 env[1355]: time="2025-05-15T10:39:11.273260393Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 15 10:39:11.289000 audit[1421]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.289000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc188fd940 a2=0 a3=7ffc188fd92c items=0 ppid=1355 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.289000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 15 10:39:11.300000 audit[1424]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.300000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffce8cc2810 a2=0 a3=7ffce8cc27fc items=0 ppid=1355 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.300000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 15 10:39:11.303000 audit[1427]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.303000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc8f9d0150 a2=0 a3=7ffc8f9d013c items=0 ppid=1355 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.303000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 15 10:39:11.305000 audit[1429]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.305000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff914a8400 a2=0 a3=7fff914a83ec items=0 ppid=1355 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.305000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 15 10:39:11.306000 audit[1431]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.306000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffebe713240 a2=0 a3=7ffebe71322c items=0 ppid=1355 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.306000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 15 10:39:11.308000 audit[1433]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.308000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff92e33360 a2=0 a3=7fff92e3334c items=0 ppid=1355 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.308000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 15 10:39:11.311000 audit[1435]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.311000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffa5f611e0 a2=0 a3=7fffa5f611cc items=0 ppid=1355 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.311000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 15 10:39:11.318000 audit[1438]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.318000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffec1e10280 a2=0 a3=7ffec1e1026c items=0 ppid=1355 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.318000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 15 10:39:11.320000 audit[1440]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.320000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffda0d5db60 a2=0 a3=7ffda0d5db4c items=0 ppid=1355 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.320000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:39:11.321000 audit[1442]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.321000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff42c7b050 a2=0 a3=7fff42c7b03c items=0 ppid=1355 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.321000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:39:11.323000 audit[1444]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.323000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffddb59a7a0 a2=0 a3=7ffddb59a78c items=0 ppid=1355 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.323000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 15 10:39:11.324531 systemd-networkd[1024]: docker0: Link UP May 15 10:39:11.333000 audit[1448]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.333000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe6a3c79d0 a2=0 a3=7ffe6a3c79bc items=0 ppid=1355 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.333000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:39:11.337000 audit[1449]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:11.337000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe121c2df0 a2=0 a3=7ffe121c2ddc items=0 ppid=1355 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.337000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:39:11.338863 env[1355]: time="2025-05-15T10:39:11.338821878Z" level=info msg="Loading containers: done." May 15 10:39:11.371090 env[1355]: time="2025-05-15T10:39:11.370966172Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 15 10:39:11.371252 env[1355]: time="2025-05-15T10:39:11.371218565Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 15 10:39:11.371361 env[1355]: time="2025-05-15T10:39:11.371333881Z" level=info msg="Daemon has completed initialization" May 15 10:39:11.390051 systemd[1]: Started docker.service. May 15 10:39:11.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:11.400392 env[1355]: time="2025-05-15T10:39:11.400319240Z" level=info msg="API listen on /run/docker.sock" May 15 10:39:12.569131 env[1205]: time="2025-05-15T10:39:12.569047149Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 15 10:39:13.128497 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount204701273.mount: Deactivated successfully. May 15 10:39:17.654341 env[1205]: time="2025-05-15T10:39:17.654280303Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:17.718223 env[1205]: time="2025-05-15T10:39:17.718170172Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:17.734601 env[1205]: time="2025-05-15T10:39:17.734549765Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:17.803572 env[1205]: time="2025-05-15T10:39:17.803515736Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:17.804290 env[1205]: time="2025-05-15T10:39:17.804254952Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb\"" May 15 10:39:17.815894 env[1205]: time="2025-05-15T10:39:17.815851514Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 15 10:39:18.388640 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 10:39:18.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:18.388829 systemd[1]: Stopped kubelet.service. May 15 10:39:18.388875 systemd[1]: kubelet.service: Consumed 1.386s CPU time. May 15 10:39:18.389987 kernel: kauditd_printk_skb: 63 callbacks suppressed May 15 10:39:18.390206 kernel: audit: type=1130 audit(1747305558.388:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:18.390045 systemd[1]: Starting kubelet.service... May 15 10:39:18.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:18.398328 kernel: audit: type=1131 audit(1747305558.388:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:18.480010 systemd[1]: Started kubelet.service. May 15 10:39:18.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:18.484674 kernel: audit: type=1130 audit(1747305558.479:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:18.541763 kubelet[1502]: E0515 10:39:18.541705 1502 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:39:18.545497 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:39:18.545616 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:39:18.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:39:18.549687 kernel: audit: type=1131 audit(1747305558.545:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:39:20.909362 env[1205]: time="2025-05-15T10:39:20.909184262Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:20.911103 env[1205]: time="2025-05-15T10:39:20.911070931Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:20.912905 env[1205]: time="2025-05-15T10:39:20.912845490Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:20.914933 env[1205]: time="2025-05-15T10:39:20.914907748Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:20.915711 env[1205]: time="2025-05-15T10:39:20.915664107Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8\"" May 15 10:39:20.933394 env[1205]: time="2025-05-15T10:39:20.933348437Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 15 10:39:22.883202 env[1205]: time="2025-05-15T10:39:22.883135380Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:22.884852 env[1205]: time="2025-05-15T10:39:22.884830520Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:22.886626 env[1205]: time="2025-05-15T10:39:22.886591724Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:22.888434 env[1205]: time="2025-05-15T10:39:22.888401127Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:22.889088 env[1205]: time="2025-05-15T10:39:22.889049233Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d\"" May 15 10:39:22.902059 env[1205]: time="2025-05-15T10:39:22.902013510Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 15 10:39:25.507766 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2373753865.mount: Deactivated successfully. May 15 10:39:27.578678 env[1205]: time="2025-05-15T10:39:27.578588779Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:27.582111 env[1205]: time="2025-05-15T10:39:27.582048268Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:27.584616 env[1205]: time="2025-05-15T10:39:27.584543418Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:27.586885 env[1205]: time="2025-05-15T10:39:27.586818275Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:27.587324 env[1205]: time="2025-05-15T10:39:27.587263210Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 15 10:39:27.597742 env[1205]: time="2025-05-15T10:39:27.597704535Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 15 10:39:28.638617 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 10:39:28.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:28.638859 systemd[1]: Stopped kubelet.service. May 15 10:39:28.640144 systemd[1]: Starting kubelet.service... May 15 10:39:28.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:28.649956 kernel: audit: type=1130 audit(1747305568.638:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:28.650046 kernel: audit: type=1131 audit(1747305568.638:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:28.661782 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1271661048.mount: Deactivated successfully. May 15 10:39:28.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:28.716254 systemd[1]: Started kubelet.service. May 15 10:39:28.722759 kernel: audit: type=1130 audit(1747305568.715:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:28.967014 kubelet[1534]: E0515 10:39:28.966882 1534 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:39:28.969592 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:39:28.969750 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:39:28.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:39:28.974723 kernel: audit: type=1131 audit(1747305568.969:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:39:32.637163 env[1205]: time="2025-05-15T10:39:32.637102324Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:32.639018 env[1205]: time="2025-05-15T10:39:32.638971410Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:32.640638 env[1205]: time="2025-05-15T10:39:32.640614342Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:32.642189 env[1205]: time="2025-05-15T10:39:32.642134553Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:32.642875 env[1205]: time="2025-05-15T10:39:32.642847701Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 15 10:39:32.659896 env[1205]: time="2025-05-15T10:39:32.659862306Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 15 10:39:33.305953 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2348729320.mount: Deactivated successfully. May 15 10:39:33.312038 env[1205]: time="2025-05-15T10:39:33.311955206Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:33.313750 env[1205]: time="2025-05-15T10:39:33.313712482Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:33.315094 env[1205]: time="2025-05-15T10:39:33.315056102Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:33.316383 env[1205]: time="2025-05-15T10:39:33.316345621Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:33.316803 env[1205]: time="2025-05-15T10:39:33.316765548Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" May 15 10:39:33.387742 env[1205]: time="2025-05-15T10:39:33.387676758Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 15 10:39:34.073667 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount431883784.mount: Deactivated successfully. May 15 10:39:37.135920 env[1205]: time="2025-05-15T10:39:37.135842054Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:37.137813 env[1205]: time="2025-05-15T10:39:37.137768197Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:37.139718 env[1205]: time="2025-05-15T10:39:37.139675605Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:37.141389 env[1205]: time="2025-05-15T10:39:37.141357770Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:37.142152 env[1205]: time="2025-05-15T10:39:37.142119639Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" May 15 10:39:39.138854 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 15 10:39:39.139106 systemd[1]: Stopped kubelet.service. May 15 10:39:39.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:39.140760 systemd[1]: Starting kubelet.service... May 15 10:39:39.150689 kernel: audit: type=1130 audit(1747305579.138:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:39.150783 kernel: audit: type=1131 audit(1747305579.138:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:39.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:39.213361 systemd[1]: Started kubelet.service. May 15 10:39:39.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:39.218678 kernel: audit: type=1130 audit(1747305579.213:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:39.263509 kubelet[1634]: E0515 10:39:39.263434 1634 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:39:39.265887 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:39:39.266035 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:39:39.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:39:39.269695 kernel: audit: type=1131 audit(1747305579.265:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:39:39.627378 systemd[1]: Stopped kubelet.service. May 15 10:39:39.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:39.630011 systemd[1]: Starting kubelet.service... May 15 10:39:39.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:39.634472 kernel: audit: type=1130 audit(1747305579.627:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:39.634522 kernel: audit: type=1131 audit(1747305579.627:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:39.645978 systemd[1]: Reloading. May 15 10:39:39.714583 /usr/lib/systemd/system-generators/torcx-generator[1669]: time="2025-05-15T10:39:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:39:39.714609 /usr/lib/systemd/system-generators/torcx-generator[1669]: time="2025-05-15T10:39:39Z" level=info msg="torcx already run" May 15 10:39:40.877123 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:39:40.877148 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:39:40.904188 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:39:40.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.990284 kernel: audit: type=1400 audit(1747305580.983:242): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.990331 kernel: audit: type=1400 audit(1747305580.983:243): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.990353 kernel: audit: type=1400 audit(1747305580.983:244): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995751 kernel: audit: type=1400 audit(1747305580.983:245): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.989000 audit: BPF prog-id=43 op=LOAD May 15 10:39:40.989000 audit: BPF prog-id=41 op=UNLOAD May 15 10:39:40.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit: BPF prog-id=44 op=LOAD May 15 10:39:40.995000 audit: BPF prog-id=38 op=UNLOAD May 15 10:39:40.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit: BPF prog-id=45 op=LOAD May 15 10:39:40.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.995000 audit: BPF prog-id=46 op=LOAD May 15 10:39:40.995000 audit: BPF prog-id=39 op=UNLOAD May 15 10:39:40.995000 audit: BPF prog-id=40 op=UNLOAD May 15 10:39:40.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit: BPF prog-id=47 op=LOAD May 15 10:39:40.996000 audit: BPF prog-id=37 op=UNLOAD May 15 10:39:40.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.996000 audit: BPF prog-id=48 op=LOAD May 15 10:39:40.996000 audit: BPF prog-id=27 op=UNLOAD May 15 10:39:40.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit: BPF prog-id=49 op=LOAD May 15 10:39:40.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.998000 audit: BPF prog-id=50 op=LOAD May 15 10:39:40.998000 audit: BPF prog-id=28 op=UNLOAD May 15 10:39:40.998000 audit: BPF prog-id=29 op=UNLOAD May 15 10:39:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit: BPF prog-id=51 op=LOAD May 15 10:39:40.999000 audit: BPF prog-id=30 op=UNLOAD May 15 10:39:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit: BPF prog-id=52 op=LOAD May 15 10:39:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.999000 audit: BPF prog-id=53 op=LOAD May 15 10:39:40.999000 audit: BPF prog-id=31 op=UNLOAD May 15 10:39:40.999000 audit: BPF prog-id=32 op=UNLOAD May 15 10:39:41.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit: BPF prog-id=54 op=LOAD May 15 10:39:41.000000 audit: BPF prog-id=36 op=UNLOAD May 15 10:39:41.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit: BPF prog-id=55 op=LOAD May 15 10:39:41.001000 audit: BPF prog-id=33 op=UNLOAD May 15 10:39:41.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit: BPF prog-id=56 op=LOAD May 15 10:39:41.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.001000 audit: BPF prog-id=57 op=LOAD May 15 10:39:41.001000 audit: BPF prog-id=34 op=UNLOAD May 15 10:39:41.001000 audit: BPF prog-id=35 op=UNLOAD May 15 10:39:41.011286 systemd[1]: Started kubelet.service. May 15 10:39:41.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:41.012694 systemd[1]: Stopping kubelet.service... May 15 10:39:41.012916 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:39:41.013066 systemd[1]: Stopped kubelet.service. May 15 10:39:41.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:41.014407 systemd[1]: Starting kubelet.service... May 15 10:39:41.089140 systemd[1]: Started kubelet.service. May 15 10:39:41.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:41.131475 kubelet[1718]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:39:41.131475 kubelet[1718]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 10:39:41.131475 kubelet[1718]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:39:41.131475 kubelet[1718]: I0515 10:39:41.128801 1718 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:39:41.642505 kubelet[1718]: I0515 10:39:41.642464 1718 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 15 10:39:41.642505 kubelet[1718]: I0515 10:39:41.642493 1718 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:39:41.642731 kubelet[1718]: I0515 10:39:41.642720 1718 server.go:927] "Client rotation is on, will bootstrap in background" May 15 10:39:41.656069 kubelet[1718]: E0515 10:39:41.656024 1718 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.58:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:41.657612 kubelet[1718]: I0515 10:39:41.657578 1718 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:39:41.668256 kubelet[1718]: I0515 10:39:41.668224 1718 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:39:41.669775 kubelet[1718]: I0515 10:39:41.669741 1718 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:39:41.669936 kubelet[1718]: I0515 10:39:41.669772 1718 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 15 10:39:41.670516 kubelet[1718]: I0515 10:39:41.670496 1718 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:39:41.670516 kubelet[1718]: I0515 10:39:41.670513 1718 container_manager_linux.go:301] "Creating device plugin manager" May 15 10:39:41.670635 kubelet[1718]: I0515 10:39:41.670617 1718 state_mem.go:36] "Initialized new in-memory state store" May 15 10:39:41.671514 kubelet[1718]: I0515 10:39:41.671495 1718 kubelet.go:400] "Attempting to sync node with API server" May 15 10:39:41.671514 kubelet[1718]: I0515 10:39:41.671511 1718 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:39:41.671565 kubelet[1718]: I0515 10:39:41.671531 1718 kubelet.go:312] "Adding apiserver pod source" May 15 10:39:41.671565 kubelet[1718]: I0515 10:39:41.671546 1718 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:39:41.672347 kubelet[1718]: W0515 10:39:41.672292 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.58:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:41.672379 kubelet[1718]: E0515 10:39:41.672368 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.58:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:41.683517 kubelet[1718]: I0515 10:39:41.683480 1718 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:39:41.688174 kubelet[1718]: I0515 10:39:41.688149 1718 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:39:41.688312 kubelet[1718]: W0515 10:39:41.688199 1718 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 10:39:41.688691 kubelet[1718]: I0515 10:39:41.688676 1718 server.go:1264] "Started kubelet" May 15 10:39:41.689000 audit[1718]: AVC avc: denied { mac_admin } for pid=1718 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.689000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:39:41.689000 audit[1718]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000841230 a1=c0006174d0 a2=c000841200 a3=25 items=0 ppid=1 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.689000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:39:41.689000 audit[1718]: AVC avc: denied { mac_admin } for pid=1718 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.689000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:39:41.689000 audit[1718]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b750a0 a1=c0006174e8 a2=c0008412c0 a3=25 items=0 ppid=1 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.689000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:39:41.690362 kubelet[1718]: I0515 10:39:41.690039 1718 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:39:41.690362 kubelet[1718]: I0515 10:39:41.690093 1718 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 10:39:41.690362 kubelet[1718]: I0515 10:39:41.690148 1718 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:39:41.690598 kubelet[1718]: W0515 10:39:41.690537 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.58:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:41.690598 kubelet[1718]: E0515 10:39:41.690584 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.58:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:41.690887 kubelet[1718]: I0515 10:39:41.689833 1718 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:39:41.691081 kubelet[1718]: I0515 10:39:41.691062 1718 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:39:41.691131 kubelet[1718]: I0515 10:39:41.691095 1718 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:39:41.691912 kubelet[1718]: I0515 10:39:41.691881 1718 server.go:455] "Adding debug handlers to kubelet server" May 15 10:39:41.692000 audit[1730]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:41.692000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff98809db0 a2=0 a3=7fff98809d9c items=0 ppid=1718 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.692000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:39:41.693000 audit[1731]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:41.693000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebd98d4b0 a2=0 a3=7ffebd98d49c items=0 ppid=1718 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.693000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:39:41.695362 kubelet[1718]: I0515 10:39:41.695337 1718 volume_manager.go:291] "Starting Kubelet Volume Manager" May 15 10:39:41.695980 kubelet[1718]: E0515 10:39:41.695937 1718 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.58:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.58:6443: connect: connection refused" interval="200ms" May 15 10:39:41.695980 kubelet[1718]: I0515 10:39:41.695957 1718 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 10:39:41.696052 kubelet[1718]: I0515 10:39:41.696036 1718 reconciler.go:26] "Reconciler: start to sync state" May 15 10:39:41.696361 kubelet[1718]: E0515 10:39:41.696314 1718 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:39:41.696509 kubelet[1718]: W0515 10:39:41.696356 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.58:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:41.696509 kubelet[1718]: E0515 10:39:41.696406 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.58:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:41.696791 kubelet[1718]: I0515 10:39:41.696612 1718 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:39:41.696000 audit[1733]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:41.696000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffa1841c50 a2=0 a3=7fffa1841c3c items=0 ppid=1718 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:39:41.697501 kubelet[1718]: I0515 10:39:41.697488 1718 factory.go:221] Registration of the containerd container factory successfully May 15 10:39:41.697501 kubelet[1718]: I0515 10:39:41.697500 1718 factory.go:221] Registration of the systemd container factory successfully May 15 10:39:41.699865 kubelet[1718]: E0515 10:39:41.699118 1718 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.58:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.58:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183fad2b3e9bb2b7 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 10:39:41.688631991 +0000 UTC m=+0.594871623,LastTimestamp:2025-05-15 10:39:41.688631991 +0000 UTC m=+0.594871623,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 10:39:41.699000 audit[1736]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:41.699000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdf7651540 a2=0 a3=7ffdf765152c items=0 ppid=1718 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.699000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:39:41.710000 audit[1744]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:41.710000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdea12ee90 a2=0 a3=7ffdea12ee7c items=0 ppid=1718 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.710000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 10:39:41.711225 kubelet[1718]: I0515 10:39:41.711182 1718 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:39:41.711455 kubelet[1718]: I0515 10:39:41.711426 1718 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 10:39:41.711455 kubelet[1718]: I0515 10:39:41.711442 1718 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 10:39:41.711543 kubelet[1718]: I0515 10:39:41.711461 1718 state_mem.go:36] "Initialized new in-memory state store" May 15 10:39:41.711000 audit[1745]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:41.711000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc1e7ab880 a2=0 a3=7ffc1e7ab86c items=0 ppid=1718 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.711000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:39:41.712246 kubelet[1718]: I0515 10:39:41.712181 1718 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:39:41.712246 kubelet[1718]: I0515 10:39:41.712211 1718 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 10:39:41.712246 kubelet[1718]: I0515 10:39:41.712232 1718 kubelet.go:2337] "Starting kubelet main sync loop" May 15 10:39:41.711000 audit[1746]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:41.711000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde632c3f0 a2=0 a3=7ffde632c3dc items=0 ppid=1718 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.711000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:39:41.712620 kubelet[1718]: E0515 10:39:41.712265 1718 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:39:41.712757 kubelet[1718]: W0515 10:39:41.712711 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.58:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:41.712811 kubelet[1718]: E0515 10:39:41.712763 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.58:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:41.712000 audit[1747]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:41.712000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9ac0a780 a2=0 a3=7ffe9ac0a76c items=0 ppid=1718 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.712000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:39:41.712000 audit[1748]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:41.712000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe72103960 a2=0 a3=7ffe7210394c items=0 ppid=1718 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.712000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:39:41.713000 audit[1749]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:41.713000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd88efc800 a2=0 a3=7ffd88efc7ec items=0 ppid=1718 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.713000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:39:41.713000 audit[1750]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:41.713000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0a880800 a2=0 a3=7fff0a8807ec items=0 ppid=1718 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.713000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:39:41.714000 audit[1751]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:41.714000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffffe976100 a2=0 a3=7ffffe9760ec items=0 ppid=1718 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.714000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:39:41.796629 kubelet[1718]: I0515 10:39:41.796580 1718 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:39:41.797034 kubelet[1718]: E0515 10:39:41.797009 1718 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.58:6443/api/v1/nodes\": dial tcp 10.0.0.58:6443: connect: connection refused" node="localhost" May 15 10:39:41.813155 kubelet[1718]: E0515 10:39:41.813108 1718 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 15 10:39:41.896727 kubelet[1718]: E0515 10:39:41.896582 1718 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.58:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.58:6443: connect: connection refused" interval="400ms" May 15 10:39:41.999117 kubelet[1718]: I0515 10:39:41.999084 1718 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:39:41.999440 kubelet[1718]: E0515 10:39:41.999415 1718 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.58:6443/api/v1/nodes\": dial tcp 10.0.0.58:6443: connect: connection refused" node="localhost" May 15 10:39:42.013582 kubelet[1718]: E0515 10:39:42.013540 1718 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 15 10:39:42.298013 kubelet[1718]: E0515 10:39:42.297889 1718 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.58:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.58:6443: connect: connection refused" interval="800ms" May 15 10:39:42.401389 kubelet[1718]: I0515 10:39:42.401352 1718 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:39:42.401757 kubelet[1718]: E0515 10:39:42.401724 1718 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.58:6443/api/v1/nodes\": dial tcp 10.0.0.58:6443: connect: connection refused" node="localhost" May 15 10:39:42.413789 kubelet[1718]: E0515 10:39:42.413762 1718 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 15 10:39:42.736533 kubelet[1718]: W0515 10:39:42.736473 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.58:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:42.736533 kubelet[1718]: E0515 10:39:42.736534 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.58:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:42.803094 kubelet[1718]: W0515 10:39:42.803065 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.58:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:42.803094 kubelet[1718]: E0515 10:39:42.803091 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.58:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:42.841509 kubelet[1718]: I0515 10:39:42.841481 1718 policy_none.go:49] "None policy: Start" May 15 10:39:42.842137 kubelet[1718]: I0515 10:39:42.842121 1718 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 10:39:42.842206 kubelet[1718]: I0515 10:39:42.842147 1718 state_mem.go:35] "Initializing new in-memory state store" May 15 10:39:42.851253 systemd[1]: Created slice kubepods.slice. May 15 10:39:42.854857 systemd[1]: Created slice kubepods-burstable.slice. May 15 10:39:42.857174 systemd[1]: Created slice kubepods-besteffort.slice. May 15 10:39:42.866452 kubelet[1718]: I0515 10:39:42.866421 1718 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:39:42.865000 audit[1718]: AVC avc: denied { mac_admin } for pid=1718 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:42.865000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:39:42.865000 audit[1718]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e86900 a1=c000617a88 a2=c000e868d0 a3=25 items=0 ppid=1 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:42.865000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:39:42.866762 kubelet[1718]: I0515 10:39:42.866479 1718 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:39:42.866762 kubelet[1718]: I0515 10:39:42.866583 1718 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:39:42.866762 kubelet[1718]: I0515 10:39:42.866698 1718 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:39:42.868189 kubelet[1718]: E0515 10:39:42.868149 1718 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 15 10:39:43.098959 kubelet[1718]: E0515 10:39:43.098820 1718 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.58:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.58:6443: connect: connection refused" interval="1.6s" May 15 10:39:43.126628 kubelet[1718]: W0515 10:39:43.126531 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.58:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:43.126628 kubelet[1718]: E0515 10:39:43.126608 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.58:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:43.203560 kubelet[1718]: I0515 10:39:43.203502 1718 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:39:43.203986 kubelet[1718]: E0515 10:39:43.203937 1718 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.58:6443/api/v1/nodes\": dial tcp 10.0.0.58:6443: connect: connection refused" node="localhost" May 15 10:39:43.214147 kubelet[1718]: I0515 10:39:43.214066 1718 topology_manager.go:215] "Topology Admit Handler" podUID="473dfa474bf9503b5b1b0f2b3bbc76f3" podNamespace="kube-system" podName="kube-apiserver-localhost" May 15 10:39:43.215017 kubelet[1718]: I0515 10:39:43.214986 1718 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 15 10:39:43.215712 kubelet[1718]: I0515 10:39:43.215694 1718 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 15 10:39:43.220197 systemd[1]: Created slice kubepods-burstable-pod473dfa474bf9503b5b1b0f2b3bbc76f3.slice. May 15 10:39:43.221259 kubelet[1718]: W0515 10:39:43.221206 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.58:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:43.221259 kubelet[1718]: E0515 10:39:43.221255 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.58:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:43.231586 systemd[1]: Created slice kubepods-burstable-podb20b39a8540dba87b5883a6f0f602dba.slice. May 15 10:39:43.235166 systemd[1]: Created slice kubepods-burstable-pod6ece95f10dbffa04b25ec3439a115512.slice. May 15 10:39:43.303763 kubelet[1718]: I0515 10:39:43.303726 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 15 10:39:43.303763 kubelet[1718]: I0515 10:39:43.303762 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/473dfa474bf9503b5b1b0f2b3bbc76f3-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"473dfa474bf9503b5b1b0f2b3bbc76f3\") " pod="kube-system/kube-apiserver-localhost" May 15 10:39:43.304106 kubelet[1718]: I0515 10:39:43.303784 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/473dfa474bf9503b5b1b0f2b3bbc76f3-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"473dfa474bf9503b5b1b0f2b3bbc76f3\") " pod="kube-system/kube-apiserver-localhost" May 15 10:39:43.304106 kubelet[1718]: I0515 10:39:43.303801 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:43.304106 kubelet[1718]: I0515 10:39:43.303818 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:43.304106 kubelet[1718]: I0515 10:39:43.303835 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:43.304106 kubelet[1718]: I0515 10:39:43.303853 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:43.304236 kubelet[1718]: I0515 10:39:43.303869 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/473dfa474bf9503b5b1b0f2b3bbc76f3-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"473dfa474bf9503b5b1b0f2b3bbc76f3\") " pod="kube-system/kube-apiserver-localhost" May 15 10:39:43.304236 kubelet[1718]: I0515 10:39:43.303884 1718 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:43.529882 kubelet[1718]: E0515 10:39:43.529825 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:43.530556 env[1205]: time="2025-05-15T10:39:43.530521795Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:473dfa474bf9503b5b1b0f2b3bbc76f3,Namespace:kube-system,Attempt:0,}" May 15 10:39:43.533937 kubelet[1718]: E0515 10:39:43.533893 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:43.534489 env[1205]: time="2025-05-15T10:39:43.534444258Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,}" May 15 10:39:43.536617 kubelet[1718]: E0515 10:39:43.536585 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:43.537059 env[1205]: time="2025-05-15T10:39:43.537029989Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,}" May 15 10:39:43.694929 kubelet[1718]: E0515 10:39:43.694889 1718 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.58:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:44.700004 kubelet[1718]: E0515 10:39:44.699953 1718 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.58:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.58:6443: connect: connection refused" interval="3.2s" May 15 10:39:44.805605 kubelet[1718]: I0515 10:39:44.805556 1718 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:39:44.805924 kubelet[1718]: E0515 10:39:44.805887 1718 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.58:6443/api/v1/nodes\": dial tcp 10.0.0.58:6443: connect: connection refused" node="localhost" May 15 10:39:45.023700 kubelet[1718]: W0515 10:39:45.023560 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.58:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:45.023700 kubelet[1718]: E0515 10:39:45.023607 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.58:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:45.294896 kubelet[1718]: W0515 10:39:45.294779 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.58:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:45.294896 kubelet[1718]: E0515 10:39:45.294835 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.58:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:45.345562 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount849611153.mount: Deactivated successfully. May 15 10:39:45.349272 env[1205]: time="2025-05-15T10:39:45.349227297Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:45.352805 env[1205]: time="2025-05-15T10:39:45.352760538Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:45.354477 env[1205]: time="2025-05-15T10:39:45.354446090Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:45.355318 env[1205]: time="2025-05-15T10:39:45.355301215Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:45.356036 env[1205]: time="2025-05-15T10:39:45.356007487Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:45.358267 env[1205]: time="2025-05-15T10:39:45.358241820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:45.359554 env[1205]: time="2025-05-15T10:39:45.359510982Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:45.361273 env[1205]: time="2025-05-15T10:39:45.361232051Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:45.364007 env[1205]: time="2025-05-15T10:39:45.363960374Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:45.365966 env[1205]: time="2025-05-15T10:39:45.365937619Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:45.367286 env[1205]: time="2025-05-15T10:39:45.367260452Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:45.367873 env[1205]: time="2025-05-15T10:39:45.367840645Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:45.406789 env[1205]: time="2025-05-15T10:39:45.406203738Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:45.406789 env[1205]: time="2025-05-15T10:39:45.406272108Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:45.406789 env[1205]: time="2025-05-15T10:39:45.406293869Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:45.406789 env[1205]: time="2025-05-15T10:39:45.406555226Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fc1193fa732c3754024d5d527c140625ec09fd7fa0b97fc99fa18f029538be22 pid=1763 runtime=io.containerd.runc.v2 May 15 10:39:45.409437 env[1205]: time="2025-05-15T10:39:45.409387948Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:45.409437 env[1205]: time="2025-05-15T10:39:45.409419868Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:45.409647 env[1205]: time="2025-05-15T10:39:45.409544454Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:45.409800 env[1205]: time="2025-05-15T10:39:45.409758601Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a8867525b6162f0d0c49a5499001217fd7a3bfd0cbd8b43cdb5341f722d48f3d pid=1775 runtime=io.containerd.runc.v2 May 15 10:39:45.418884 env[1205]: time="2025-05-15T10:39:45.418804004Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:45.418884 env[1205]: time="2025-05-15T10:39:45.418848358Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:45.418972 env[1205]: time="2025-05-15T10:39:45.418906889Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:45.419124 env[1205]: time="2025-05-15T10:39:45.419064218Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/80d480c088e43c3900760d30a87e5eccc06ee259f8a9ec694f26abac98ce1d6a pid=1790 runtime=io.containerd.runc.v2 May 15 10:39:45.447446 systemd[1]: Started cri-containerd-fc1193fa732c3754024d5d527c140625ec09fd7fa0b97fc99fa18f029538be22.scope. May 15 10:39:45.460799 systemd[1]: Started cri-containerd-80d480c088e43c3900760d30a87e5eccc06ee259f8a9ec694f26abac98ce1d6a.scope. May 15 10:39:45.464572 systemd[1]: Started cri-containerd-a8867525b6162f0d0c49a5499001217fd7a3bfd0cbd8b43cdb5341f722d48f3d.scope. May 15 10:39:45.528680 kernel: kauditd_printk_skb: 219 callbacks suppressed May 15 10:39:45.528814 kernel: audit: type=1400 audit(1747305585.522:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.528839 kernel: audit: type=1400 audit(1747305585.522:433): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.530479 kernel: audit: type=1400 audit(1747305585.522:434): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.536686 kernel: audit: type=1400 audit(1747305585.522:435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.539981 kernel: audit: type=1400 audit(1747305585.522:436): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.543451 kernel: audit: type=1400 audit(1747305585.522:437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.546581 kernel: audit: type=1400 audit(1747305585.522:438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.546635 kernel: audit: type=1400 audit(1747305585.522:439): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.549513 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 15 10:39:45.549558 kernel: audit: type=1400 audit(1747305585.522:440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.524000 audit: BPF prog-id=58 op=LOAD May 15 10:39:45.524000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.524000 audit[1791]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1763 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663313139336661373332633337353430323464356435323763313430 May 15 10:39:45.524000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.524000 audit[1791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1763 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663313139336661373332633337353430323464356435323763313430 May 15 10:39:45.524000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.524000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.524000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.524000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.524000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.524000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.524000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.524000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.524000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.532000 audit: BPF prog-id=59 op=LOAD May 15 10:39:45.536000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.536000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1790 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643438306330383865343363333930303736306433306138376535 May 15 10:39:45.536000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.536000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1790 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643438306330383865343363333930303736306433306138376535 May 15 10:39:45.536000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.536000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.536000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.536000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.536000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.536000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.536000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.536000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.536000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.524000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.524000 audit: BPF prog-id=60 op=LOAD May 15 10:39:45.524000 audit[1791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000222370 items=0 ppid=1763 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663313139336661373332633337353430323464356435323763313430 May 15 10:39:45.539000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.539000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.539000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.539000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.539000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.539000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.539000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.539000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.539000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.552000 audit: BPF prog-id=63 op=LOAD May 15 10:39:45.539000 audit[1791]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002223b8 items=0 ppid=1763 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663313139336661373332633337353430323464356435323763313430 May 15 10:39:45.552000 audit: BPF prog-id=61 op=UNLOAD May 15 10:39:45.552000 audit: BPF prog-id=60 op=UNLOAD May 15 10:39:45.552000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.552000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.552000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.552000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.552000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.552000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.552000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.552000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.552000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.552000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.552000 audit: BPF prog-id=64 op=LOAD May 15 10:39:45.552000 audit[1791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002227c8 items=0 ppid=1763 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663313139336661373332633337353430323464356435323763313430 May 15 10:39:45.557471 kubelet[1718]: E0515 10:39:45.554118 1718 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.58:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.58:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183fad2b3e9bb2b7 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 10:39:41.688631991 +0000 UTC m=+0.594871623,LastTimestamp:2025-05-15 10:39:41.688631991 +0000 UTC m=+0.594871623,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 10:39:45.557471 kubelet[1718]: W0515 10:39:45.556558 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.58:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:45.557471 kubelet[1718]: E0515 10:39:45.556598 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.58:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:45.536000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003e85f0 items=0 ppid=1790 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643438306330383865343363333930303736306433306138376535 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit: BPF prog-id=65 op=LOAD May 15 10:39:45.557000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e8638 items=0 ppid=1790 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643438306330383865343363333930303736306433306138376535 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1775 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138383637353235623631363266306430633439613534393930303132 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1775 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138383637353235623631363266306430633439613534393930303132 May 15 10:39:45.557000 audit: BPF prog-id=65 op=UNLOAD May 15 10:39:45.557000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit: BPF prog-id=62 op=UNLOAD May 15 10:39:45.557000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit: BPF prog-id=66 op=LOAD May 15 10:39:45.557000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0003d2660 items=0 ppid=1775 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138383637353235623631363266306430633439613534393930303132 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit: BPF prog-id=67 op=LOAD May 15 10:39:45.557000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0003d26a8 items=0 ppid=1775 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138383637353235623631363266306430633439613534393930303132 May 15 10:39:45.557000 audit: BPF prog-id=67 op=UNLOAD May 15 10:39:45.557000 audit: BPF prog-id=66 op=UNLOAD May 15 10:39:45.557000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:45.557000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e8a48 items=0 ppid=1790 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:45.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643438306330383865343363333930303736306433306138376535 May 15 10:39:45.589078 kubelet[1718]: W0515 10:39:45.568503 1718 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.58:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:45.589078 kubelet[1718]: E0515 10:39:45.568533 1718 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.58:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.58:6443: connect: connection refused May 15 10:39:45.600357 env[1205]: time="2025-05-15T10:39:45.600300612Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,} returns sandbox id \"fc1193fa732c3754024d5d527c140625ec09fd7fa0b97fc99fa18f029538be22\"" May 15 10:39:45.601674 kubelet[1718]: E0515 10:39:45.601484 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:45.605411 env[1205]: time="2025-05-15T10:39:45.605368138Z" level=info msg="CreateContainer within sandbox \"fc1193fa732c3754024d5d527c140625ec09fd7fa0b97fc99fa18f029538be22\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 15 10:39:45.616103 env[1205]: time="2025-05-15T10:39:45.616051442Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:473dfa474bf9503b5b1b0f2b3bbc76f3,Namespace:kube-system,Attempt:0,} returns sandbox id \"a8867525b6162f0d0c49a5499001217fd7a3bfd0cbd8b43cdb5341f722d48f3d\"" May 15 10:39:45.616838 kubelet[1718]: E0515 10:39:45.616809 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:45.619986 env[1205]: time="2025-05-15T10:39:45.619952302Z" level=info msg="CreateContainer within sandbox \"a8867525b6162f0d0c49a5499001217fd7a3bfd0cbd8b43cdb5341f722d48f3d\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 15 10:39:45.620527 env[1205]: time="2025-05-15T10:39:45.620493330Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,} returns sandbox id \"80d480c088e43c3900760d30a87e5eccc06ee259f8a9ec694f26abac98ce1d6a\"" May 15 10:39:45.621112 kubelet[1718]: E0515 10:39:45.621079 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:45.622950 env[1205]: time="2025-05-15T10:39:45.622916863Z" level=info msg="CreateContainer within sandbox \"80d480c088e43c3900760d30a87e5eccc06ee259f8a9ec694f26abac98ce1d6a\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 15 10:39:46.031497 env[1205]: time="2025-05-15T10:39:46.031423380Z" level=info msg="CreateContainer within sandbox \"fc1193fa732c3754024d5d527c140625ec09fd7fa0b97fc99fa18f029538be22\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"a612b00c750b9927ca8a43c09e71c7d5df0b8d5643793f1e4c243568568fea7c\"" May 15 10:39:46.032297 env[1205]: time="2025-05-15T10:39:46.032251340Z" level=info msg="StartContainer for \"a612b00c750b9927ca8a43c09e71c7d5df0b8d5643793f1e4c243568568fea7c\"" May 15 10:39:46.046526 systemd[1]: Started cri-containerd-a612b00c750b9927ca8a43c09e71c7d5df0b8d5643793f1e4c243568568fea7c.scope. May 15 10:39:46.052069 env[1205]: time="2025-05-15T10:39:46.051014355Z" level=info msg="CreateContainer within sandbox \"a8867525b6162f0d0c49a5499001217fd7a3bfd0cbd8b43cdb5341f722d48f3d\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"55cbffe21ae7615bae6d71ee002e3f1a7bfea6ce9560be34be6e363b61fdcc70\"" May 15 10:39:46.052730 env[1205]: time="2025-05-15T10:39:46.052710564Z" level=info msg="StartContainer for \"55cbffe21ae7615bae6d71ee002e3f1a7bfea6ce9560be34be6e363b61fdcc70\"" May 15 10:39:46.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.058000 audit: BPF prog-id=70 op=LOAD May 15 10:39:46.059437 env[1205]: time="2025-05-15T10:39:46.059391855Z" level=info msg="CreateContainer within sandbox \"80d480c088e43c3900760d30a87e5eccc06ee259f8a9ec694f26abac98ce1d6a\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"7f975b44155fba18b8d1f30dfa36055d7bb31bdf7ec2b08598991899434582b2\"" May 15 10:39:46.058000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.058000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1763 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313262303063373530623939323763613861343363303965373163 May 15 10:39:46.058000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.058000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1763 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313262303063373530623939323763613861343363303965373163 May 15 10:39:46.058000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.058000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.058000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.058000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.058000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.058000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.058000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.058000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.058000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.058000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.058000 audit: BPF prog-id=71 op=LOAD May 15 10:39:46.058000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000ba640 items=0 ppid=1763 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313262303063373530623939323763613861343363303965373163 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit: BPF prog-id=72 op=LOAD May 15 10:39:46.059000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000ba688 items=0 ppid=1763 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313262303063373530623939323763613861343363303965373163 May 15 10:39:46.059000 audit: BPF prog-id=72 op=UNLOAD May 15 10:39:46.059000 audit: BPF prog-id=71 op=UNLOAD May 15 10:39:46.059000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.059000 audit: BPF prog-id=73 op=LOAD May 15 10:39:46.059000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000baa98 items=0 ppid=1763 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313262303063373530623939323763613861343363303965373163 May 15 10:39:46.061730 env[1205]: time="2025-05-15T10:39:46.061702812Z" level=info msg="StartContainer for \"7f975b44155fba18b8d1f30dfa36055d7bb31bdf7ec2b08598991899434582b2\"" May 15 10:39:46.068833 systemd[1]: Started cri-containerd-55cbffe21ae7615bae6d71ee002e3f1a7bfea6ce9560be34be6e363b61fdcc70.scope. May 15 10:39:46.084902 systemd[1]: Started cri-containerd-7f975b44155fba18b8d1f30dfa36055d7bb31bdf7ec2b08598991899434582b2.scope. May 15 10:39:46.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.086000 audit: BPF prog-id=74 op=LOAD May 15 10:39:46.087000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1775 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535636266666532316165373631356261653664373165653030326533 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1775 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535636266666532316165373631356261653664373165653030326533 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit: BPF prog-id=75 op=LOAD May 15 10:39:46.087000 audit[1911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a8720 items=0 ppid=1775 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535636266666532316165373631356261653664373165653030326533 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit: BPF prog-id=76 op=LOAD May 15 10:39:46.087000 audit[1911]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a8768 items=0 ppid=1775 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535636266666532316165373631356261653664373165653030326533 May 15 10:39:46.087000 audit: BPF prog-id=76 op=UNLOAD May 15 10:39:46.087000 audit: BPF prog-id=75 op=UNLOAD May 15 10:39:46.087000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.087000 audit: BPF prog-id=77 op=LOAD May 15 10:39:46.087000 audit[1911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a8b78 items=0 ppid=1775 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535636266666532316165373631356261653664373165653030326533 May 15 10:39:46.105757 env[1205]: time="2025-05-15T10:39:46.105707227Z" level=info msg="StartContainer for \"a612b00c750b9927ca8a43c09e71c7d5df0b8d5643793f1e4c243568568fea7c\" returns successfully" May 15 10:39:46.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.112000 audit: BPF prog-id=78 op=LOAD May 15 10:39:46.113000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.113000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=1790 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766393735623434313535666261313862386431663330646661333630 May 15 10:39:46.113000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.113000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=8 items=0 ppid=1790 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766393735623434313535666261313862386431663330646661333630 May 15 10:39:46.113000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.113000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.113000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.113000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.113000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.113000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.113000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.113000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.113000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.113000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.113000 audit: BPF prog-id=79 op=LOAD May 15 10:39:46.113000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c0003008c0 items=0 ppid=1790 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766393735623434313535666261313862386431663330646661333630 May 15 10:39:46.114000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.114000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.114000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.114000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.114000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.114000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.114000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.114000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.114000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.114000 audit: BPF prog-id=80 op=LOAD May 15 10:39:46.114000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c000300908 items=0 ppid=1790 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766393735623434313535666261313862386431663330646661333630 May 15 10:39:46.115000 audit: BPF prog-id=80 op=UNLOAD May 15 10:39:46.115000 audit: BPF prog-id=79 op=UNLOAD May 15 10:39:46.115000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.115000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.115000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.115000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.115000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.115000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.115000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.115000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.115000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.115000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:46.115000 audit: BPF prog-id=81 op=LOAD May 15 10:39:46.115000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c000300d18 items=0 ppid=1790 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766393735623434313535666261313862386431663330646661333630 May 15 10:39:46.123704 env[1205]: time="2025-05-15T10:39:46.119828950Z" level=info msg="StartContainer for \"55cbffe21ae7615bae6d71ee002e3f1a7bfea6ce9560be34be6e363b61fdcc70\" returns successfully" May 15 10:39:46.144037 env[1205]: time="2025-05-15T10:39:46.143981685Z" level=info msg="StartContainer for \"7f975b44155fba18b8d1f30dfa36055d7bb31bdf7ec2b08598991899434582b2\" returns successfully" May 15 10:39:46.725947 kubelet[1718]: E0515 10:39:46.725875 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:46.728201 kubelet[1718]: E0515 10:39:46.728173 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:46.729273 kubelet[1718]: E0515 10:39:46.729246 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:47.163000 audit[1899]: AVC avc: denied { watch } for pid=1899 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:47.163000 audit[1899]: AVC avc: denied { watch } for pid=1899 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:47.163000 audit[1899]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000164bc0 a2=fc6 a3=0 items=0 ppid=1763 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 key=(null) May 15 10:39:47.163000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:47.163000 audit[1899]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00094e030 a2=fc6 a3=0 items=0 ppid=1763 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 key=(null) May 15 10:39:47.163000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:47.319000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:47.319000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:47.319000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0067c8160 a2=fc6 a3=0 items=0 ppid=1775 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 key=(null) May 15 10:39:47.319000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00663c0c0 a2=fc6 a3=0 items=0 ppid=1775 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 key=(null) May 15 10:39:47.319000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:47.319000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:47.319000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:47.319000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00663c120 a2=fc6 a3=0 items=0 ppid=1775 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 key=(null) May 15 10:39:47.319000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:47.321000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:47.321000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c005c80b70 a2=fc6 a3=0 items=0 ppid=1775 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 key=(null) May 15 10:39:47.321000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:47.348000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:47.348000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c005c812f0 a2=fc6 a3=0 items=0 ppid=1775 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 key=(null) May 15 10:39:47.348000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:47.348000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:47.348000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c0054bc9c0 a2=fc6 a3=0 items=0 ppid=1775 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 key=(null) May 15 10:39:47.348000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:47.711892 kubelet[1718]: E0515 10:39:47.711842 1718 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found May 15 10:39:47.732266 kubelet[1718]: E0515 10:39:47.732231 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:47.732605 kubelet[1718]: E0515 10:39:47.732366 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:47.732605 kubelet[1718]: E0515 10:39:47.732400 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:47.902936 kubelet[1718]: E0515 10:39:47.902896 1718 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 15 10:39:48.007453 kubelet[1718]: I0515 10:39:48.007367 1718 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:39:48.015387 kubelet[1718]: I0515 10:39:48.015348 1718 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 15 10:39:48.021826 kubelet[1718]: E0515 10:39:48.021795 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:48.122164 kubelet[1718]: E0515 10:39:48.122110 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:48.223165 kubelet[1718]: E0515 10:39:48.223096 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:48.323871 kubelet[1718]: E0515 10:39:48.323746 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:48.424455 kubelet[1718]: E0515 10:39:48.424401 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:48.525065 kubelet[1718]: E0515 10:39:48.525010 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:48.625863 kubelet[1718]: E0515 10:39:48.625730 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:48.726126 kubelet[1718]: E0515 10:39:48.726065 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:48.734145 kubelet[1718]: E0515 10:39:48.734109 1718 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:48.826264 kubelet[1718]: E0515 10:39:48.826217 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:48.927060 kubelet[1718]: E0515 10:39:48.927014 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:49.027756 kubelet[1718]: E0515 10:39:49.027694 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:49.128379 kubelet[1718]: E0515 10:39:49.128320 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:49.229539 kubelet[1718]: E0515 10:39:49.229376 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:49.330108 kubelet[1718]: E0515 10:39:49.330048 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:49.430648 kubelet[1718]: E0515 10:39:49.430603 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:49.531472 kubelet[1718]: E0515 10:39:49.531372 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:49.532494 systemd[1]: Reloading. May 15 10:39:49.599611 /usr/lib/systemd/system-generators/torcx-generator[2015]: time="2025-05-15T10:39:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:39:49.599640 /usr/lib/systemd/system-generators/torcx-generator[2015]: time="2025-05-15T10:39:49Z" level=info msg="torcx already run" May 15 10:39:49.631921 kubelet[1718]: E0515 10:39:49.631878 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:49.715826 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:39:49.715842 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:39:49.732228 kubelet[1718]: E0515 10:39:49.732175 1718 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:49.733281 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:39:49.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.802000 audit: BPF prog-id=82 op=LOAD May 15 10:39:49.802000 audit: BPF prog-id=43 op=UNLOAD May 15 10:39:49.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.802000 audit: BPF prog-id=83 op=LOAD May 15 10:39:49.802000 audit: BPF prog-id=74 op=UNLOAD May 15 10:39:49.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit: BPF prog-id=84 op=LOAD May 15 10:39:49.804000 audit: BPF prog-id=44 op=UNLOAD May 15 10:39:49.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit: BPF prog-id=85 op=LOAD May 15 10:39:49.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.804000 audit: BPF prog-id=86 op=LOAD May 15 10:39:49.804000 audit: BPF prog-id=45 op=UNLOAD May 15 10:39:49.804000 audit: BPF prog-id=46 op=UNLOAD May 15 10:39:49.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit: BPF prog-id=87 op=LOAD May 15 10:39:49.805000 audit: BPF prog-id=63 op=UNLOAD May 15 10:39:49.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.806000 audit: BPF prog-id=88 op=LOAD May 15 10:39:49.806000 audit: BPF prog-id=58 op=UNLOAD May 15 10:39:49.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.806000 audit: BPF prog-id=89 op=LOAD May 15 10:39:49.806000 audit: BPF prog-id=47 op=UNLOAD May 15 10:39:49.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.807000 audit: BPF prog-id=90 op=LOAD May 15 10:39:49.807000 audit: BPF prog-id=48 op=UNLOAD May 15 10:39:49.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit: BPF prog-id=91 op=LOAD May 15 10:39:49.808000 audit: BPF prog-id=59 op=UNLOAD May 15 10:39:49.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit: BPF prog-id=92 op=LOAD May 15 10:39:49.809000 audit: BPF prog-id=70 op=UNLOAD May 15 10:39:49.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit: BPF prog-id=93 op=LOAD May 15 10:39:49.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.809000 audit: BPF prog-id=94 op=LOAD May 15 10:39:49.809000 audit: BPF prog-id=49 op=UNLOAD May 15 10:39:49.809000 audit: BPF prog-id=50 op=UNLOAD May 15 10:39:49.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.810000 audit: BPF prog-id=95 op=LOAD May 15 10:39:49.810000 audit: BPF prog-id=78 op=UNLOAD May 15 10:39:49.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit: BPF prog-id=96 op=LOAD May 15 10:39:49.811000 audit: BPF prog-id=51 op=UNLOAD May 15 10:39:49.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit: BPF prog-id=97 op=LOAD May 15 10:39:49.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.811000 audit: BPF prog-id=98 op=LOAD May 15 10:39:49.811000 audit: BPF prog-id=52 op=UNLOAD May 15 10:39:49.811000 audit: BPF prog-id=53 op=UNLOAD May 15 10:39:49.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit: BPF prog-id=99 op=LOAD May 15 10:39:49.812000 audit: BPF prog-id=54 op=UNLOAD May 15 10:39:49.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.812000 audit: BPF prog-id=100 op=LOAD May 15 10:39:49.813000 audit: BPF prog-id=55 op=UNLOAD May 15 10:39:49.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit: BPF prog-id=101 op=LOAD May 15 10:39:49.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.813000 audit: BPF prog-id=102 op=LOAD May 15 10:39:49.813000 audit: BPF prog-id=56 op=UNLOAD May 15 10:39:49.813000 audit: BPF prog-id=57 op=UNLOAD May 15 10:39:49.823976 systemd[1]: Stopping kubelet.service... May 15 10:39:49.847090 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:39:49.847302 systemd[1]: Stopped kubelet.service. May 15 10:39:49.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:49.849094 systemd[1]: Starting kubelet.service... May 15 10:39:49.925396 systemd[1]: Started kubelet.service. May 15 10:39:49.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:49.986639 kubelet[2060]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:39:49.986639 kubelet[2060]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 10:39:49.986639 kubelet[2060]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:39:49.987037 kubelet[2060]: I0515 10:39:49.986714 2060 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:39:49.991302 kubelet[2060]: I0515 10:39:49.991267 2060 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 15 10:39:49.991302 kubelet[2060]: I0515 10:39:49.991291 2060 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:39:49.991517 kubelet[2060]: I0515 10:39:49.991500 2060 server.go:927] "Client rotation is on, will bootstrap in background" May 15 10:39:49.992616 kubelet[2060]: I0515 10:39:49.992597 2060 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 15 10:39:49.993587 kubelet[2060]: I0515 10:39:49.993565 2060 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:39:50.000667 kubelet[2060]: I0515 10:39:50.000627 2060 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:39:50.000835 kubelet[2060]: I0515 10:39:50.000806 2060 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:39:50.000969 kubelet[2060]: I0515 10:39:50.000828 2060 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 15 10:39:50.001069 kubelet[2060]: I0515 10:39:50.000975 2060 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:39:50.001069 kubelet[2060]: I0515 10:39:50.000983 2060 container_manager_linux.go:301] "Creating device plugin manager" May 15 10:39:50.001069 kubelet[2060]: I0515 10:39:50.001014 2060 state_mem.go:36] "Initialized new in-memory state store" May 15 10:39:50.001135 kubelet[2060]: I0515 10:39:50.001088 2060 kubelet.go:400] "Attempting to sync node with API server" May 15 10:39:50.001135 kubelet[2060]: I0515 10:39:50.001097 2060 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:39:50.001135 kubelet[2060]: I0515 10:39:50.001113 2060 kubelet.go:312] "Adding apiserver pod source" May 15 10:39:50.001135 kubelet[2060]: I0515 10:39:50.001128 2060 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:39:50.001572 kubelet[2060]: I0515 10:39:50.001555 2060 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:39:50.001841 kubelet[2060]: I0515 10:39:50.001824 2060 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:39:50.002316 kubelet[2060]: I0515 10:39:50.002301 2060 server.go:1264] "Started kubelet" May 15 10:39:50.002529 kubelet[2060]: I0515 10:39:50.002485 2060 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:39:50.002822 kubelet[2060]: I0515 10:39:50.002774 2060 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:39:50.003398 kubelet[2060]: I0515 10:39:50.003375 2060 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:39:50.003788 kubelet[2060]: I0515 10:39:50.003761 2060 server.go:455] "Adding debug handlers to kubelet server" May 15 10:39:50.004000 audit[2060]: AVC avc: denied { mac_admin } for pid=2060 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.004000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:39:50.004000 audit[2060]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000783b00 a1=c0000e5f68 a2=c000783ad0 a3=25 items=0 ppid=1 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.004000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:39:50.004000 audit[2060]: AVC avc: denied { mac_admin } for pid=2060 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.004000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:39:50.004000 audit[2060]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000846940 a1=c0000e5f80 a2=c000783b90 a3=25 items=0 ppid=1 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.004000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:39:50.005842 kubelet[2060]: I0515 10:39:50.005318 2060 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:39:50.005842 kubelet[2060]: I0515 10:39:50.005359 2060 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 10:39:50.005842 kubelet[2060]: I0515 10:39:50.005389 2060 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:39:50.005842 kubelet[2060]: I0515 10:39:50.005476 2060 volume_manager.go:291] "Starting Kubelet Volume Manager" May 15 10:39:50.006830 kubelet[2060]: I0515 10:39:50.006809 2060 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 10:39:50.006919 kubelet[2060]: I0515 10:39:50.006899 2060 reconciler.go:26] "Reconciler: start to sync state" May 15 10:39:50.007125 kubelet[2060]: E0515 10:39:50.007102 2060 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:50.008669 kubelet[2060]: I0515 10:39:50.008637 2060 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:39:50.018246 kubelet[2060]: E0515 10:39:50.018209 2060 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:39:50.019175 kubelet[2060]: I0515 10:39:50.019135 2060 factory.go:221] Registration of the containerd container factory successfully May 15 10:39:50.019175 kubelet[2060]: I0515 10:39:50.019153 2060 factory.go:221] Registration of the systemd container factory successfully May 15 10:39:50.028248 kubelet[2060]: I0515 10:39:50.028199 2060 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:39:50.029082 kubelet[2060]: I0515 10:39:50.029043 2060 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:39:50.029139 kubelet[2060]: I0515 10:39:50.029084 2060 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 10:39:50.029139 kubelet[2060]: I0515 10:39:50.029106 2060 kubelet.go:2337] "Starting kubelet main sync loop" May 15 10:39:50.029229 kubelet[2060]: E0515 10:39:50.029202 2060 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:39:50.049600 kubelet[2060]: I0515 10:39:50.049563 2060 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 10:39:50.049600 kubelet[2060]: I0515 10:39:50.049580 2060 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 10:39:50.049600 kubelet[2060]: I0515 10:39:50.049596 2060 state_mem.go:36] "Initialized new in-memory state store" May 15 10:39:50.049820 kubelet[2060]: I0515 10:39:50.049770 2060 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 15 10:39:50.049820 kubelet[2060]: I0515 10:39:50.049779 2060 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 15 10:39:50.049820 kubelet[2060]: I0515 10:39:50.049794 2060 policy_none.go:49] "None policy: Start" May 15 10:39:50.050221 kubelet[2060]: I0515 10:39:50.050196 2060 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 10:39:50.050221 kubelet[2060]: I0515 10:39:50.050214 2060 state_mem.go:35] "Initializing new in-memory state store" May 15 10:39:50.050330 kubelet[2060]: I0515 10:39:50.050314 2060 state_mem.go:75] "Updated machine memory state" May 15 10:39:50.053000 audit[2060]: AVC avc: denied { mac_admin } for pid=2060 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.053000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:39:50.053000 audit[2060]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000783aa0 a1=c00107e570 a2=c000783a70 a3=25 items=0 ppid=1 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.054024 kubelet[2060]: I0515 10:39:50.053801 2060 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:39:50.053000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:39:50.056752 kubelet[2060]: I0515 10:39:50.056698 2060 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:39:50.056912 kubelet[2060]: I0515 10:39:50.056863 2060 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:39:50.057042 kubelet[2060]: I0515 10:39:50.057025 2060 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:39:50.110885 kubelet[2060]: I0515 10:39:50.110857 2060 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:39:50.130109 kubelet[2060]: I0515 10:39:50.130064 2060 topology_manager.go:215] "Topology Admit Handler" podUID="473dfa474bf9503b5b1b0f2b3bbc76f3" podNamespace="kube-system" podName="kube-apiserver-localhost" May 15 10:39:50.130181 kubelet[2060]: I0515 10:39:50.130158 2060 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 15 10:39:50.130246 kubelet[2060]: I0515 10:39:50.130209 2060 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 15 10:39:50.208094 kubelet[2060]: I0515 10:39:50.208060 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:50.208267 kubelet[2060]: I0515 10:39:50.208100 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:50.208267 kubelet[2060]: I0515 10:39:50.208119 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 15 10:39:50.208267 kubelet[2060]: I0515 10:39:50.208133 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/473dfa474bf9503b5b1b0f2b3bbc76f3-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"473dfa474bf9503b5b1b0f2b3bbc76f3\") " pod="kube-system/kube-apiserver-localhost" May 15 10:39:50.208267 kubelet[2060]: I0515 10:39:50.208145 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/473dfa474bf9503b5b1b0f2b3bbc76f3-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"473dfa474bf9503b5b1b0f2b3bbc76f3\") " pod="kube-system/kube-apiserver-localhost" May 15 10:39:50.208267 kubelet[2060]: I0515 10:39:50.208158 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:50.208405 kubelet[2060]: I0515 10:39:50.208184 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/473dfa474bf9503b5b1b0f2b3bbc76f3-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"473dfa474bf9503b5b1b0f2b3bbc76f3\") " pod="kube-system/kube-apiserver-localhost" May 15 10:39:50.208405 kubelet[2060]: I0515 10:39:50.208228 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:50.208405 kubelet[2060]: I0515 10:39:50.208241 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:50.307539 kubelet[2060]: I0515 10:39:50.307381 2060 kubelet_node_status.go:112] "Node was previously registered" node="localhost" May 15 10:39:50.307539 kubelet[2060]: I0515 10:39:50.307480 2060 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 15 10:39:50.517983 kubelet[2060]: E0515 10:39:50.517942 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:50.566693 kernel: kauditd_printk_skb: 652 callbacks suppressed May 15 10:39:50.566836 kernel: audit: type=1400 audit(1747305590.564:791): avc: denied { watch } for pid=1899 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:50.564000 audit[1899]: AVC avc: denied { watch } for pid=1899 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:50.564000 audit[1899]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d3e020 a2=fc6 a3=0 items=0 ppid=1763 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 key=(null) May 15 10:39:50.575515 kernel: audit: type=1300 audit(1747305590.564:791): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d3e020 a2=fc6 a3=0 items=0 ppid=1763 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 key=(null) May 15 10:39:50.575707 kernel: audit: type=1327 audit(1747305590.564:791): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:50.564000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:50.564000 audit[1899]: AVC avc: denied { watch } for pid=1899 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:50.583206 kernel: audit: type=1400 audit(1747305590.564:792): avc: denied { watch } for pid=1899 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:50.583348 kernel: audit: type=1300 audit(1747305590.564:792): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b78060 a2=fc6 a3=0 items=0 ppid=1763 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 key=(null) May 15 10:39:50.564000 audit[1899]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b78060 a2=fc6 a3=0 items=0 ppid=1763 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 key=(null) May 15 10:39:50.564000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:50.591948 kernel: audit: type=1327 audit(1747305590.564:792): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:50.592006 kernel: audit: type=1400 audit(1747305590.567:793): avc: denied { watch } for pid=1899 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:50.567000 audit[1899]: AVC avc: denied { watch } for pid=1899 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:50.567000 audit[1899]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001083560 a2=fc6 a3=0 items=0 ppid=1763 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 key=(null) May 15 10:39:50.600328 kernel: audit: type=1300 audit(1747305590.567:793): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001083560 a2=fc6 a3=0 items=0 ppid=1763 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 key=(null) May 15 10:39:50.600364 kernel: audit: type=1327 audit(1747305590.567:793): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:50.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:50.567000 audit[1899]: AVC avc: denied { watch } for pid=1899 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:50.608061 kubelet[2060]: E0515 10:39:50.608023 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:50.608263 kubelet[2060]: E0515 10:39:50.608118 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:50.623906 kernel: audit: type=1400 audit(1747305590.567:794): avc: denied { watch } for pid=1899 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:50.567000 audit[1899]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001083580 a2=fc6 a3=0 items=0 ppid=1763 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 key=(null) May 15 10:39:50.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:51.001944 kubelet[2060]: I0515 10:39:51.001898 2060 apiserver.go:52] "Watching apiserver" May 15 10:39:51.007314 kubelet[2060]: I0515 10:39:51.007274 2060 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 10:39:51.043941 kubelet[2060]: E0515 10:39:51.043898 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:51.043941 kubelet[2060]: E0515 10:39:51.043943 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:51.050867 kubelet[2060]: E0515 10:39:51.050447 2060 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 15 10:39:51.051085 kubelet[2060]: E0515 10:39:51.050896 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:51.080014 kubelet[2060]: I0515 10:39:51.079946 2060 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.079924167 podStartE2EDuration="1.079924167s" podCreationTimestamp="2025-05-15 10:39:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:39:51.07985169 +0000 UTC m=+1.151073873" watchObservedRunningTime="2025-05-15 10:39:51.079924167 +0000 UTC m=+1.151146350" May 15 10:39:51.099992 kubelet[2060]: I0515 10:39:51.099911 2060 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.099891053 podStartE2EDuration="1.099891053s" podCreationTimestamp="2025-05-15 10:39:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:39:51.092736357 +0000 UTC m=+1.163958560" watchObservedRunningTime="2025-05-15 10:39:51.099891053 +0000 UTC m=+1.171113236" May 15 10:39:51.100210 kubelet[2060]: I0515 10:39:51.100073 2060 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.100066164 podStartE2EDuration="1.100066164s" podCreationTimestamp="2025-05-15 10:39:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:39:51.099848462 +0000 UTC m=+1.171070645" watchObservedRunningTime="2025-05-15 10:39:51.100066164 +0000 UTC m=+1.171288357" May 15 10:39:51.241000 audit[1899]: AVC avc: denied { watch } for pid=1899 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 10:39:51.241000 audit[1899]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e58940 a2=fc6 a3=0 items=0 ppid=1763 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 key=(null) May 15 10:39:51.241000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:51.894247 update_engine[1197]: I0515 10:39:51.893873 1197 update_attempter.cc:509] Updating boot flags... May 15 10:39:52.057002 kubelet[2060]: E0515 10:39:52.056200 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:52.057002 kubelet[2060]: E0515 10:39:52.056949 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:54.639707 kubelet[2060]: E0515 10:39:54.639632 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:55.534153 sudo[1343]: pam_unix(sudo:session): session closed for user root May 15 10:39:55.533000 audit[1343]: USER_END pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:39:55.534000 audit[1343]: CRED_DISP pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:39:55.536552 sshd[1340]: pam_unix(sshd:session): session closed for user core May 15 10:39:55.536000 audit[1340]: USER_END pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:55.536000 audit[1340]: CRED_DISP pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:55.538557 systemd[1]: sshd@6-10.0.0.58:22-10.0.0.1:54160.service: Deactivated successfully. May 15 10:39:55.539361 systemd[1]: session-7.scope: Deactivated successfully. May 15 10:39:55.539512 systemd[1]: session-7.scope: Consumed 4.803s CPU time. May 15 10:39:55.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.58:22-10.0.0.1:54160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:55.540245 systemd-logind[1195]: Session 7 logged out. Waiting for processes to exit. May 15 10:39:55.540955 systemd-logind[1195]: Removed session 7. May 15 10:39:56.827374 kubelet[2060]: E0515 10:39:56.827337 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:57.064238 kubelet[2060]: E0515 10:39:57.064207 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:02.040711 kubelet[2060]: E0515 10:40:02.040675 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:03.147347 kubelet[2060]: I0515 10:40:03.147301 2060 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 15 10:40:03.147751 env[1205]: time="2025-05-15T10:40:03.147644125Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 10:40:03.147918 kubelet[2060]: I0515 10:40:03.147797 2060 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 15 10:40:03.710953 kubelet[2060]: I0515 10:40:03.710906 2060 topology_manager.go:215] "Topology Admit Handler" podUID="ffe3f39e-d70e-40cd-b698-80e685c25028" podNamespace="kube-system" podName="kube-proxy-xmjxp" May 15 10:40:03.716705 systemd[1]: Created slice kubepods-besteffort-podffe3f39e_d70e_40cd_b698_80e685c25028.slice. May 15 10:40:03.830932 kubelet[2060]: I0515 10:40:03.830885 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ffe3f39e-d70e-40cd-b698-80e685c25028-kube-proxy\") pod \"kube-proxy-xmjxp\" (UID: \"ffe3f39e-d70e-40cd-b698-80e685c25028\") " pod="kube-system/kube-proxy-xmjxp" May 15 10:40:03.830932 kubelet[2060]: I0515 10:40:03.830928 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9rdds\" (UniqueName: \"kubernetes.io/projected/ffe3f39e-d70e-40cd-b698-80e685c25028-kube-api-access-9rdds\") pod \"kube-proxy-xmjxp\" (UID: \"ffe3f39e-d70e-40cd-b698-80e685c25028\") " pod="kube-system/kube-proxy-xmjxp" May 15 10:40:03.830932 kubelet[2060]: I0515 10:40:03.830947 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ffe3f39e-d70e-40cd-b698-80e685c25028-lib-modules\") pod \"kube-proxy-xmjxp\" (UID: \"ffe3f39e-d70e-40cd-b698-80e685c25028\") " pod="kube-system/kube-proxy-xmjxp" May 15 10:40:03.830932 kubelet[2060]: I0515 10:40:03.830959 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ffe3f39e-d70e-40cd-b698-80e685c25028-xtables-lock\") pod \"kube-proxy-xmjxp\" (UID: \"ffe3f39e-d70e-40cd-b698-80e685c25028\") " pod="kube-system/kube-proxy-xmjxp" May 15 10:40:04.026011 kubelet[2060]: E0515 10:40:04.025893 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:04.026517 env[1205]: time="2025-05-15T10:40:04.026444748Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xmjxp,Uid:ffe3f39e-d70e-40cd-b698-80e685c25028,Namespace:kube-system,Attempt:0,}" May 15 10:40:04.127827 env[1205]: time="2025-05-15T10:40:04.127766227Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:40:04.128007 env[1205]: time="2025-05-15T10:40:04.127802315Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:40:04.128007 env[1205]: time="2025-05-15T10:40:04.127812374Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:40:04.128007 env[1205]: time="2025-05-15T10:40:04.127927200Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dd0818e733b2d0999dd9a2622221c69382045f98d2ee8e849427aef3f3d2eb1c pid=2169 runtime=io.containerd.runc.v2 May 15 10:40:04.143258 systemd[1]: Started cri-containerd-dd0818e733b2d0999dd9a2622221c69382045f98d2ee8e849427aef3f3d2eb1c.scope. May 15 10:40:04.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.155009 kernel: kauditd_printk_skb: 10 callbacks suppressed May 15 10:40:04.155067 kernel: audit: type=1400 audit(1747305604.150:801): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.163797 kernel: audit: type=1400 audit(1747305604.150:802): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.164073 kernel: audit: type=1400 audit(1747305604.150:803): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.172131 kernel: audit: type=1400 audit(1747305604.150:804): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.172213 kernel: audit: type=1400 audit(1747305604.150:805): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.180678 kernel: audit: type=1400 audit(1747305604.150:806): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.180724 kernel: audit: type=1400 audit(1747305604.150:807): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.184781 kernel: audit: type=1400 audit(1747305604.150:808): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.184861 kubelet[2060]: I0515 10:40:04.181577 2060 topology_manager.go:215] "Topology Admit Handler" podUID="3d6c212a-fc22-488d-8a79-08f4e4a5f4cd" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-v7mbk" May 15 10:40:04.188819 kernel: audit: type=1400 audit(1747305604.150:809): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.192355 kernel: audit: type=1400 audit(1747305604.154:810): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.189456 systemd[1]: Created slice kubepods-besteffort-pod3d6c212a_fc22_488d_8a79_08f4e4a5f4cd.slice. May 15 10:40:04.154000 audit: BPF prog-id=103 op=LOAD May 15 10:40:04.158000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2169 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464303831386537333362326430393939646439613236323232323163 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2169 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464303831386537333362326430393939646439613236323232323163 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit: BPF prog-id=104 op=LOAD May 15 10:40:04.158000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00035afe0 items=0 ppid=2169 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464303831386537333362326430393939646439613236323232323163 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.158000 audit: BPF prog-id=105 op=LOAD May 15 10:40:04.158000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00035b028 items=0 ppid=2169 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464303831386537333362326430393939646439613236323232323163 May 15 10:40:04.167000 audit: BPF prog-id=105 op=UNLOAD May 15 10:40:04.167000 audit: BPF prog-id=104 op=UNLOAD May 15 10:40:04.167000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.167000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.167000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.167000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.167000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.167000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.167000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.167000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.167000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.167000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.167000 audit: BPF prog-id=106 op=LOAD May 15 10:40:04.167000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00035b438 items=0 ppid=2169 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464303831386537333362326430393939646439613236323232323163 May 15 10:40:04.202088 env[1205]: time="2025-05-15T10:40:04.202034574Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xmjxp,Uid:ffe3f39e-d70e-40cd-b698-80e685c25028,Namespace:kube-system,Attempt:0,} returns sandbox id \"dd0818e733b2d0999dd9a2622221c69382045f98d2ee8e849427aef3f3d2eb1c\"" May 15 10:40:04.202872 kubelet[2060]: E0515 10:40:04.202841 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:04.204828 env[1205]: time="2025-05-15T10:40:04.204789190Z" level=info msg="CreateContainer within sandbox \"dd0818e733b2d0999dd9a2622221c69382045f98d2ee8e849427aef3f3d2eb1c\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 10:40:04.223399 env[1205]: time="2025-05-15T10:40:04.223363240Z" level=info msg="CreateContainer within sandbox \"dd0818e733b2d0999dd9a2622221c69382045f98d2ee8e849427aef3f3d2eb1c\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"b8ad4f4d8bdd10a85b1e80869bdf1a40c410445772ccf556e7dc99aabc359df7\"" May 15 10:40:04.224221 env[1205]: time="2025-05-15T10:40:04.224203302Z" level=info msg="StartContainer for \"b8ad4f4d8bdd10a85b1e80869bdf1a40c410445772ccf556e7dc99aabc359df7\"" May 15 10:40:04.241331 systemd[1]: Started cri-containerd-b8ad4f4d8bdd10a85b1e80869bdf1a40c410445772ccf556e7dc99aabc359df7.scope. May 15 10:40:04.255000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.255000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6b592b1988 items=0 ppid=2169 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238616434663464386264643130613835623165383038363962646631 May 15 10:40:04.255000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.255000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.255000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.255000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.255000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.255000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.255000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.255000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.255000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.255000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.255000 audit: BPF prog-id=107 op=LOAD May 15 10:40:04.255000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000e1ba8 items=0 ppid=2169 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238616434663464386264643130613835623165383038363962646631 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit: BPF prog-id=108 op=LOAD May 15 10:40:04.256000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000e1bf8 items=0 ppid=2169 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238616434663464386264643130613835623165383038363962646631 May 15 10:40:04.256000 audit: BPF prog-id=108 op=UNLOAD May 15 10:40:04.256000 audit: BPF prog-id=107 op=UNLOAD May 15 10:40:04.256000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.256000 audit: BPF prog-id=109 op=LOAD May 15 10:40:04.256000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000e1c88 items=0 ppid=2169 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238616434663464386264643130613835623165383038363962646631 May 15 10:40:04.323000 audit[2263]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.323000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff92f9c360 a2=0 a3=7fff92f9c34c items=0 ppid=2219 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.323000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:40:04.325000 audit[2264]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.325000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdcba922e0 a2=0 a3=7ffdcba922cc items=0 ppid=2219 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:40:04.326000 audit[2267]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.326000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa7dba110 a2=0 a3=7fffa7dba0fc items=0 ppid=2219 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:40:04.327000 audit[2266]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.327000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff10243830 a2=0 a3=7fff1024381c items=0 ppid=2219 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.327000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:40:04.328000 audit[2268]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.328000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff64d975e0 a2=0 a3=7fff64d975cc items=0 ppid=2219 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:40:04.328000 audit[2269]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.328000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe96acff10 a2=0 a3=7ffe96acfefc items=0 ppid=2219 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.328000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:40:04.333684 kubelet[2060]: I0515 10:40:04.333612 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dsrs5\" (UniqueName: \"kubernetes.io/projected/3d6c212a-fc22-488d-8a79-08f4e4a5f4cd-kube-api-access-dsrs5\") pod \"tigera-operator-797db67f8-v7mbk\" (UID: \"3d6c212a-fc22-488d-8a79-08f4e4a5f4cd\") " pod="tigera-operator/tigera-operator-797db67f8-v7mbk" May 15 10:40:04.333684 kubelet[2060]: I0515 10:40:04.333674 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3d6c212a-fc22-488d-8a79-08f4e4a5f4cd-var-lib-calico\") pod \"tigera-operator-797db67f8-v7mbk\" (UID: \"3d6c212a-fc22-488d-8a79-08f4e4a5f4cd\") " pod="tigera-operator/tigera-operator-797db67f8-v7mbk" May 15 10:40:04.345924 env[1205]: time="2025-05-15T10:40:04.345876277Z" level=info msg="StartContainer for \"b8ad4f4d8bdd10a85b1e80869bdf1a40c410445772ccf556e7dc99aabc359df7\" returns successfully" May 15 10:40:04.425000 audit[2270]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.425000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff06f128d0 a2=0 a3=7fff06f128bc items=0 ppid=2219 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:40:04.427000 audit[2272]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.427000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffff83621c0 a2=0 a3=7ffff83621ac items=0 ppid=2219 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 10:40:04.430000 audit[2275]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.430000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff98a7b7a0 a2=0 a3=7fff98a7b78c items=0 ppid=2219 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 10:40:04.431000 audit[2276]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.431000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcaca7d710 a2=0 a3=7ffcaca7d6fc items=0 ppid=2219 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:40:04.433000 audit[2278]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.433000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd4f75d770 a2=0 a3=7ffd4f75d75c items=0 ppid=2219 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:40:04.434000 audit[2279]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.434000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf8eda190 a2=0 a3=7ffcf8eda17c items=0 ppid=2219 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:40:04.436000 audit[2281]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.436000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc02a36060 a2=0 a3=7ffc02a3604c items=0 ppid=2219 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:40:04.439000 audit[2284]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.439000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff4a8a2280 a2=0 a3=7fff4a8a226c items=0 ppid=2219 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 10:40:04.440000 audit[2286]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.440000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd796d090 a2=0 a3=7fffd796d07c items=0 ppid=2219 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:40:04.443000 audit[2288]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.443000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffedad4ddd0 a2=0 a3=7ffedad4ddbc items=0 ppid=2219 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:40:04.444000 audit[2289]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.444000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7002e8e0 a2=0 a3=7ffd7002e8cc items=0 ppid=2219 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.444000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:40:04.446000 audit[2291]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.446000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffddb25abc0 a2=0 a3=7ffddb25abac items=0 ppid=2219 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:40:04.449000 audit[2294]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.449000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc125d6390 a2=0 a3=7ffc125d637c items=0 ppid=2219 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.449000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:40:04.451000 audit[2297]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.451000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd0138a970 a2=0 a3=7ffd0138a95c items=0 ppid=2219 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:40:04.452000 audit[2298]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.452000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffee7440ad0 a2=0 a3=7ffee7440abc items=0 ppid=2219 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:40:04.454000 audit[2300]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.454000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd752b7080 a2=0 a3=7ffd752b706c items=0 ppid=2219 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:40:04.457000 audit[2303]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.457000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd475d7f0 a2=0 a3=7ffdd475d7dc items=0 ppid=2219 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.457000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:40:04.458000 audit[2304]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.458000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef89d8a00 a2=0 a3=7ffef89d89ec items=0 ppid=2219 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:40:04.460000 audit[2306]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:40:04.460000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffce4384ae0 a2=0 a3=7ffce4384acc items=0 ppid=2219 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.460000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:40:04.478000 audit[2312]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:04.478000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc75930590 a2=0 a3=7ffc7593057c items=0 ppid=2219 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.478000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:04.490000 audit[2312]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:04.490000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc75930590 a2=0 a3=7ffc7593057c items=0 ppid=2219 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.490000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:04.491000 audit[2318]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.491000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe2008a970 a2=0 a3=7ffe2008a95c items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.491000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:40:04.492521 env[1205]: time="2025-05-15T10:40:04.492478928Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-v7mbk,Uid:3d6c212a-fc22-488d-8a79-08f4e4a5f4cd,Namespace:tigera-operator,Attempt:0,}" May 15 10:40:04.495000 audit[2320]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.495000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeda1a94f0 a2=0 a3=7ffeda1a94dc items=0 ppid=2219 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.495000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 10:40:04.499000 audit[2323]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.499000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffffb3dc980 a2=0 a3=7ffffb3dc96c items=0 ppid=2219 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.499000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 10:40:04.500000 audit[2324]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.500000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda3e2ea40 a2=0 a3=7ffda3e2ea2c items=0 ppid=2219 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.500000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:40:04.502000 audit[2326]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.502000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffcb8446f0 a2=0 a3=7fffcb8446dc items=0 ppid=2219 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.502000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:40:04.503000 audit[2327]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.503000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0b88fa50 a2=0 a3=7ffd0b88fa3c items=0 ppid=2219 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.503000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:40:04.505000 audit[2329]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.505000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcba935180 a2=0 a3=7ffcba93516c items=0 ppid=2219 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.505000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 10:40:04.508000 audit[2332]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.508000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe0580e680 a2=0 a3=7ffe0580e66c items=0 ppid=2219 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.508000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:40:04.509000 audit[2333]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.509000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5fbf1e10 a2=0 a3=7fff5fbf1dfc items=0 ppid=2219 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.509000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:40:04.511000 audit[2335]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.511000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc001cbb0 a2=0 a3=7ffcc001cb9c items=0 ppid=2219 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.511000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:40:04.512000 audit[2336]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.512000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1dc2dc40 a2=0 a3=7ffe1dc2dc2c items=0 ppid=2219 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.512000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:40:04.514000 audit[2338]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.514000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff356477d0 a2=0 a3=7fff356477bc items=0 ppid=2219 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.514000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:40:04.517000 audit[2341]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.517000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffffc378ce0 a2=0 a3=7ffffc378ccc items=0 ppid=2219 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.517000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:40:04.520000 audit[2344]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.520000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffff789b5b0 a2=0 a3=7ffff789b59c items=0 ppid=2219 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.520000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 10:40:04.521000 audit[2345]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.521000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffea400f230 a2=0 a3=7ffea400f21c items=0 ppid=2219 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:40:04.523000 audit[2347]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.523000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc50ec7690 a2=0 a3=7ffc50ec767c items=0 ppid=2219 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.523000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:40:04.526000 audit[2350]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.526000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd514ff870 a2=0 a3=7ffd514ff85c items=0 ppid=2219 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.526000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:40:04.527000 audit[2351]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.527000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeec128900 a2=0 a3=7ffeec1288ec items=0 ppid=2219 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:40:04.529000 audit[2353]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.529000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffee2122a30 a2=0 a3=7ffee2122a1c items=0 ppid=2219 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.529000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:40:04.530000 audit[2354]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.530000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd731212f0 a2=0 a3=7ffd731212dc items=0 ppid=2219 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.530000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:40:04.531000 audit[2356]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.531000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffef858d4d0 a2=0 a3=7ffef858d4bc items=0 ppid=2219 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.531000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:40:04.534000 audit[2359]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:40:04.534000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff03e189e0 a2=0 a3=7fff03e189cc items=0 ppid=2219 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:40:04.537000 audit[2361]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:40:04.537000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fffc0467ae0 a2=0 a3=7fffc0467acc items=0 ppid=2219 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.537000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:04.537000 audit[2361]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:40:04.537000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffc0467ae0 a2=0 a3=7fffc0467acc items=0 ppid=2219 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.537000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:04.563749 env[1205]: time="2025-05-15T10:40:04.563647979Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:40:04.563749 env[1205]: time="2025-05-15T10:40:04.563719144Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:40:04.563749 env[1205]: time="2025-05-15T10:40:04.563730295Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:40:04.563971 env[1205]: time="2025-05-15T10:40:04.563933767Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/70f8aac3a288bfbf06c3609cd20f739a875397d942d12ab18b914fcc34fbc7fa pid=2369 runtime=io.containerd.runc.v2 May 15 10:40:04.575116 systemd[1]: Started cri-containerd-70f8aac3a288bfbf06c3609cd20f739a875397d942d12ab18b914fcc34fbc7fa.scope. May 15 10:40:04.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.586000 audit: BPF prog-id=110 op=LOAD May 15 10:40:04.587000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2369 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730663861616333613238386266626630366333363039636432306637 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2369 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730663861616333613238386266626630366333363039636432306637 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit: BPF prog-id=111 op=LOAD May 15 10:40:04.587000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000279d80 items=0 ppid=2369 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730663861616333613238386266626630366333363039636432306637 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit: BPF prog-id=112 op=LOAD May 15 10:40:04.587000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000279dc8 items=0 ppid=2369 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730663861616333613238386266626630366333363039636432306637 May 15 10:40:04.587000 audit: BPF prog-id=112 op=UNLOAD May 15 10:40:04.587000 audit: BPF prog-id=111 op=UNLOAD May 15 10:40:04.587000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.587000 audit: BPF prog-id=113 op=LOAD May 15 10:40:04.587000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003ee1d8 items=0 ppid=2369 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730663861616333613238386266626630366333363039636432306637 May 15 10:40:04.611697 env[1205]: time="2025-05-15T10:40:04.611628554Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-v7mbk,Uid:3d6c212a-fc22-488d-8a79-08f4e4a5f4cd,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"70f8aac3a288bfbf06c3609cd20f739a875397d942d12ab18b914fcc34fbc7fa\"" May 15 10:40:04.615275 env[1205]: time="2025-05-15T10:40:04.615155334Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 15 10:40:04.643851 kubelet[2060]: E0515 10:40:04.643822 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:04.942864 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2195819984.mount: Deactivated successfully. May 15 10:40:05.077831 kubelet[2060]: E0515 10:40:05.077795 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:05.085722 kubelet[2060]: I0515 10:40:05.085670 2060 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-xmjxp" podStartSLOduration=2.085640628 podStartE2EDuration="2.085640628s" podCreationTimestamp="2025-05-15 10:40:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:40:05.08546665 +0000 UTC m=+15.156688833" watchObservedRunningTime="2025-05-15 10:40:05.085640628 +0000 UTC m=+15.156862811" May 15 10:40:06.362012 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount445280400.mount: Deactivated successfully. May 15 10:40:07.143540 env[1205]: time="2025-05-15T10:40:07.143477619Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:07.145409 env[1205]: time="2025-05-15T10:40:07.145346395Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:07.147418 env[1205]: time="2025-05-15T10:40:07.147373820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:07.149133 env[1205]: time="2025-05-15T10:40:07.149088375Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:07.149532 env[1205]: time="2025-05-15T10:40:07.149491364Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 15 10:40:07.151438 env[1205]: time="2025-05-15T10:40:07.151400466Z" level=info msg="CreateContainer within sandbox \"70f8aac3a288bfbf06c3609cd20f739a875397d942d12ab18b914fcc34fbc7fa\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 15 10:40:07.166521 env[1205]: time="2025-05-15T10:40:07.166468266Z" level=info msg="CreateContainer within sandbox \"70f8aac3a288bfbf06c3609cd20f739a875397d942d12ab18b914fcc34fbc7fa\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"5f97e86485dcfc0ecb1374b1da14bb1f81c024fe2ab1c04337628ea3229f80d0\"" May 15 10:40:07.167107 env[1205]: time="2025-05-15T10:40:07.167059197Z" level=info msg="StartContainer for \"5f97e86485dcfc0ecb1374b1da14bb1f81c024fe2ab1c04337628ea3229f80d0\"" May 15 10:40:07.180814 systemd[1]: Started cri-containerd-5f97e86485dcfc0ecb1374b1da14bb1f81c024fe2ab1c04337628ea3229f80d0.scope. May 15 10:40:07.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit: BPF prog-id=114 op=LOAD May 15 10:40:07.194000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2369 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566393765383634383564636663306563623133373462316461313462 May 15 10:40:07.194000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2369 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566393765383634383564636663306563623133373462316461313462 May 15 10:40:07.194000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit: BPF prog-id=115 op=LOAD May 15 10:40:07.194000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001e8cf0 items=0 ppid=2369 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566393765383634383564636663306563623133373462316461313462 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit: BPF prog-id=116 op=LOAD May 15 10:40:07.195000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001e8d38 items=0 ppid=2369 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566393765383634383564636663306563623133373462316461313462 May 15 10:40:07.195000 audit: BPF prog-id=116 op=UNLOAD May 15 10:40:07.195000 audit: BPF prog-id=115 op=UNLOAD May 15 10:40:07.195000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195000 audit: BPF prog-id=117 op=LOAD May 15 10:40:07.195000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001e9148 items=0 ppid=2369 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566393765383634383564636663306563623133373462316461313462 May 15 10:40:07.230015 env[1205]: time="2025-05-15T10:40:07.229964333Z" level=info msg="StartContainer for \"5f97e86485dcfc0ecb1374b1da14bb1f81c024fe2ab1c04337628ea3229f80d0\" returns successfully" May 15 10:40:08.092124 kubelet[2060]: I0515 10:40:08.092062 2060 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-v7mbk" podStartSLOduration=1.555085333 podStartE2EDuration="4.092041285s" podCreationTimestamp="2025-05-15 10:40:04 +0000 UTC" firstStartedPulling="2025-05-15 10:40:04.613301904 +0000 UTC m=+14.684524087" lastFinishedPulling="2025-05-15 10:40:07.150257856 +0000 UTC m=+17.221480039" observedRunningTime="2025-05-15 10:40:08.091842081 +0000 UTC m=+18.163064264" watchObservedRunningTime="2025-05-15 10:40:08.092041285 +0000 UTC m=+18.163263468" May 15 10:40:10.043959 kernel: kauditd_printk_skb: 357 callbacks suppressed May 15 10:40:10.044119 kernel: audit: type=1325 audit(1747305610.033:912): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:10.044143 kernel: audit: type=1300 audit(1747305610.033:912): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc9b933c20 a2=0 a3=7ffc9b933c0c items=0 ppid=2219 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.033000 audit[2444]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:10.033000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc9b933c20 a2=0 a3=7ffc9b933c0c items=0 ppid=2219 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.033000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:10.046740 kernel: audit: type=1327 audit(1747305610.033:912): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:10.046000 audit[2444]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:10.053678 kernel: audit: type=1325 audit(1747305610.046:913): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:10.065753 kernel: audit: type=1300 audit(1747305610.046:913): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc9b933c20 a2=0 a3=0 items=0 ppid=2219 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.065904 kernel: audit: type=1327 audit(1747305610.046:913): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:10.046000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc9b933c20 a2=0 a3=0 items=0 ppid=2219 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.046000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:10.104000 audit[2446]: NETFILTER_CFG table=filter:91 family=2 entries=17 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:10.104000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fffe30a90d0 a2=0 a3=7fffe30a90bc items=0 ppid=2219 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.112232 kernel: audit: type=1325 audit(1747305610.104:914): table=filter:91 family=2 entries=17 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:10.112351 kernel: audit: type=1300 audit(1747305610.104:914): arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fffe30a90d0 a2=0 a3=7fffe30a90bc items=0 ppid=2219 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.112372 kernel: audit: type=1327 audit(1747305610.104:914): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:10.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:10.118000 audit[2446]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:10.118000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffe30a90d0 a2=0 a3=0 items=0 ppid=2219 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.118000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:10.122681 kernel: audit: type=1325 audit(1747305610.118:915): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:10.167227 kubelet[2060]: I0515 10:40:10.167174 2060 topology_manager.go:215] "Topology Admit Handler" podUID="64c72f1f-d600-4ab9-a629-3e4df9f3ddb0" podNamespace="calico-system" podName="calico-typha-6dc9784fb8-clbrm" May 15 10:40:10.177829 systemd[1]: Created slice kubepods-besteffort-pod64c72f1f_d600_4ab9_a629_3e4df9f3ddb0.slice. May 15 10:40:10.217425 kubelet[2060]: I0515 10:40:10.217372 2060 topology_manager.go:215] "Topology Admit Handler" podUID="bb6a67fe-212a-4e09-b11c-36a06fdfb3a4" podNamespace="calico-system" podName="calico-node-fxdwx" May 15 10:40:10.221978 systemd[1]: Created slice kubepods-besteffort-podbb6a67fe_212a_4e09_b11c_36a06fdfb3a4.slice. May 15 10:40:10.271303 kubelet[2060]: I0515 10:40:10.271248 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/bb6a67fe-212a-4e09-b11c-36a06fdfb3a4-flexvol-driver-host\") pod \"calico-node-fxdwx\" (UID: \"bb6a67fe-212a-4e09-b11c-36a06fdfb3a4\") " pod="calico-system/calico-node-fxdwx" May 15 10:40:10.271303 kubelet[2060]: I0515 10:40:10.271294 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/bb6a67fe-212a-4e09-b11c-36a06fdfb3a4-var-run-calico\") pod \"calico-node-fxdwx\" (UID: \"bb6a67fe-212a-4e09-b11c-36a06fdfb3a4\") " pod="calico-system/calico-node-fxdwx" May 15 10:40:10.271303 kubelet[2060]: I0515 10:40:10.271310 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z7mk5\" (UniqueName: \"kubernetes.io/projected/bb6a67fe-212a-4e09-b11c-36a06fdfb3a4-kube-api-access-z7mk5\") pod \"calico-node-fxdwx\" (UID: \"bb6a67fe-212a-4e09-b11c-36a06fdfb3a4\") " pod="calico-system/calico-node-fxdwx" May 15 10:40:10.271550 kubelet[2060]: I0515 10:40:10.271322 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bb6a67fe-212a-4e09-b11c-36a06fdfb3a4-tigera-ca-bundle\") pod \"calico-node-fxdwx\" (UID: \"bb6a67fe-212a-4e09-b11c-36a06fdfb3a4\") " pod="calico-system/calico-node-fxdwx" May 15 10:40:10.271550 kubelet[2060]: I0515 10:40:10.271336 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/bb6a67fe-212a-4e09-b11c-36a06fdfb3a4-cni-bin-dir\") pod \"calico-node-fxdwx\" (UID: \"bb6a67fe-212a-4e09-b11c-36a06fdfb3a4\") " pod="calico-system/calico-node-fxdwx" May 15 10:40:10.271550 kubelet[2060]: I0515 10:40:10.271349 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/bb6a67fe-212a-4e09-b11c-36a06fdfb3a4-node-certs\") pod \"calico-node-fxdwx\" (UID: \"bb6a67fe-212a-4e09-b11c-36a06fdfb3a4\") " pod="calico-system/calico-node-fxdwx" May 15 10:40:10.271550 kubelet[2060]: I0515 10:40:10.271360 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/bb6a67fe-212a-4e09-b11c-36a06fdfb3a4-cni-log-dir\") pod \"calico-node-fxdwx\" (UID: \"bb6a67fe-212a-4e09-b11c-36a06fdfb3a4\") " pod="calico-system/calico-node-fxdwx" May 15 10:40:10.271550 kubelet[2060]: I0515 10:40:10.271376 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/64c72f1f-d600-4ab9-a629-3e4df9f3ddb0-tigera-ca-bundle\") pod \"calico-typha-6dc9784fb8-clbrm\" (UID: \"64c72f1f-d600-4ab9-a629-3e4df9f3ddb0\") " pod="calico-system/calico-typha-6dc9784fb8-clbrm" May 15 10:40:10.271694 kubelet[2060]: I0515 10:40:10.271387 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/64c72f1f-d600-4ab9-a629-3e4df9f3ddb0-typha-certs\") pod \"calico-typha-6dc9784fb8-clbrm\" (UID: \"64c72f1f-d600-4ab9-a629-3e4df9f3ddb0\") " pod="calico-system/calico-typha-6dc9784fb8-clbrm" May 15 10:40:10.271694 kubelet[2060]: I0515 10:40:10.271400 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dhqzf\" (UniqueName: \"kubernetes.io/projected/64c72f1f-d600-4ab9-a629-3e4df9f3ddb0-kube-api-access-dhqzf\") pod \"calico-typha-6dc9784fb8-clbrm\" (UID: \"64c72f1f-d600-4ab9-a629-3e4df9f3ddb0\") " pod="calico-system/calico-typha-6dc9784fb8-clbrm" May 15 10:40:10.271694 kubelet[2060]: I0515 10:40:10.271412 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/bb6a67fe-212a-4e09-b11c-36a06fdfb3a4-lib-modules\") pod \"calico-node-fxdwx\" (UID: \"bb6a67fe-212a-4e09-b11c-36a06fdfb3a4\") " pod="calico-system/calico-node-fxdwx" May 15 10:40:10.271694 kubelet[2060]: I0515 10:40:10.271427 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/bb6a67fe-212a-4e09-b11c-36a06fdfb3a4-cni-net-dir\") pod \"calico-node-fxdwx\" (UID: \"bb6a67fe-212a-4e09-b11c-36a06fdfb3a4\") " pod="calico-system/calico-node-fxdwx" May 15 10:40:10.271694 kubelet[2060]: I0515 10:40:10.271439 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/bb6a67fe-212a-4e09-b11c-36a06fdfb3a4-xtables-lock\") pod \"calico-node-fxdwx\" (UID: \"bb6a67fe-212a-4e09-b11c-36a06fdfb3a4\") " pod="calico-system/calico-node-fxdwx" May 15 10:40:10.271869 kubelet[2060]: I0515 10:40:10.271450 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/bb6a67fe-212a-4e09-b11c-36a06fdfb3a4-policysync\") pod \"calico-node-fxdwx\" (UID: \"bb6a67fe-212a-4e09-b11c-36a06fdfb3a4\") " pod="calico-system/calico-node-fxdwx" May 15 10:40:10.271869 kubelet[2060]: I0515 10:40:10.271464 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/bb6a67fe-212a-4e09-b11c-36a06fdfb3a4-var-lib-calico\") pod \"calico-node-fxdwx\" (UID: \"bb6a67fe-212a-4e09-b11c-36a06fdfb3a4\") " pod="calico-system/calico-node-fxdwx" May 15 10:40:10.337745 kubelet[2060]: I0515 10:40:10.337591 2060 topology_manager.go:215] "Topology Admit Handler" podUID="832e5ea9-1687-4404-aa5d-bd6cc85411ec" podNamespace="calico-system" podName="csi-node-driver-6mxq2" May 15 10:40:10.338755 kubelet[2060]: E0515 10:40:10.337923 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6mxq2" podUID="832e5ea9-1687-4404-aa5d-bd6cc85411ec" May 15 10:40:10.373194 kubelet[2060]: I0515 10:40:10.372176 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/832e5ea9-1687-4404-aa5d-bd6cc85411ec-kubelet-dir\") pod \"csi-node-driver-6mxq2\" (UID: \"832e5ea9-1687-4404-aa5d-bd6cc85411ec\") " pod="calico-system/csi-node-driver-6mxq2" May 15 10:40:10.373194 kubelet[2060]: I0515 10:40:10.372256 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/832e5ea9-1687-4404-aa5d-bd6cc85411ec-varrun\") pod \"csi-node-driver-6mxq2\" (UID: \"832e5ea9-1687-4404-aa5d-bd6cc85411ec\") " pod="calico-system/csi-node-driver-6mxq2" May 15 10:40:10.373194 kubelet[2060]: I0515 10:40:10.372270 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/832e5ea9-1687-4404-aa5d-bd6cc85411ec-socket-dir\") pod \"csi-node-driver-6mxq2\" (UID: \"832e5ea9-1687-4404-aa5d-bd6cc85411ec\") " pod="calico-system/csi-node-driver-6mxq2" May 15 10:40:10.373194 kubelet[2060]: I0515 10:40:10.372310 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/832e5ea9-1687-4404-aa5d-bd6cc85411ec-registration-dir\") pod \"csi-node-driver-6mxq2\" (UID: \"832e5ea9-1687-4404-aa5d-bd6cc85411ec\") " pod="calico-system/csi-node-driver-6mxq2" May 15 10:40:10.373194 kubelet[2060]: I0515 10:40:10.372378 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fdp9b\" (UniqueName: \"kubernetes.io/projected/832e5ea9-1687-4404-aa5d-bd6cc85411ec-kube-api-access-fdp9b\") pod \"csi-node-driver-6mxq2\" (UID: \"832e5ea9-1687-4404-aa5d-bd6cc85411ec\") " pod="calico-system/csi-node-driver-6mxq2" May 15 10:40:10.373447 kubelet[2060]: E0515 10:40:10.373269 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.373447 kubelet[2060]: W0515 10:40:10.373283 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.373447 kubelet[2060]: E0515 10:40:10.373312 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.373547 kubelet[2060]: E0515 10:40:10.373528 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.373547 kubelet[2060]: W0515 10:40:10.373538 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.373620 kubelet[2060]: E0515 10:40:10.373550 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.374543 kubelet[2060]: E0515 10:40:10.374519 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.374543 kubelet[2060]: W0515 10:40:10.374536 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.374642 kubelet[2060]: E0515 10:40:10.374552 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.374788 kubelet[2060]: E0515 10:40:10.374773 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.374788 kubelet[2060]: W0515 10:40:10.374786 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.374877 kubelet[2060]: E0515 10:40:10.374854 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.374952 kubelet[2060]: E0515 10:40:10.374939 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.374952 kubelet[2060]: W0515 10:40:10.374949 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.375036 kubelet[2060]: E0515 10:40:10.375005 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.375108 kubelet[2060]: E0515 10:40:10.375095 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.375108 kubelet[2060]: W0515 10:40:10.375104 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.375328 kubelet[2060]: E0515 10:40:10.375307 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.379165 kubelet[2060]: E0515 10:40:10.379151 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.379165 kubelet[2060]: W0515 10:40:10.379166 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.379250 kubelet[2060]: E0515 10:40:10.379240 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.379336 kubelet[2060]: E0515 10:40:10.379320 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.379398 kubelet[2060]: W0515 10:40:10.379339 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.381845 kubelet[2060]: E0515 10:40:10.381821 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.381962 kubelet[2060]: E0515 10:40:10.381949 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.381962 kubelet[2060]: W0515 10:40:10.381960 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.382047 kubelet[2060]: E0515 10:40:10.382036 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.382119 kubelet[2060]: E0515 10:40:10.382107 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.382119 kubelet[2060]: W0515 10:40:10.382115 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.382188 kubelet[2060]: E0515 10:40:10.382174 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.382254 kubelet[2060]: E0515 10:40:10.382244 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.382254 kubelet[2060]: W0515 10:40:10.382251 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.382365 kubelet[2060]: E0515 10:40:10.382335 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.382423 kubelet[2060]: E0515 10:40:10.382373 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.382423 kubelet[2060]: W0515 10:40:10.382379 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.382606 kubelet[2060]: E0515 10:40:10.382491 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.382606 kubelet[2060]: E0515 10:40:10.382494 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.382606 kubelet[2060]: W0515 10:40:10.382520 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.382606 kubelet[2060]: E0515 10:40:10.382576 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.382886 kubelet[2060]: E0515 10:40:10.382790 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.382886 kubelet[2060]: W0515 10:40:10.382801 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.382886 kubelet[2060]: E0515 10:40:10.382811 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.383158 kubelet[2060]: E0515 10:40:10.383026 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.383158 kubelet[2060]: W0515 10:40:10.383037 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.383158 kubelet[2060]: E0515 10:40:10.383048 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.383298 kubelet[2060]: E0515 10:40:10.383286 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.383369 kubelet[2060]: W0515 10:40:10.383353 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.383449 kubelet[2060]: E0515 10:40:10.383434 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.383905 kubelet[2060]: E0515 10:40:10.383891 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.383905 kubelet[2060]: W0515 10:40:10.383902 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.383984 kubelet[2060]: E0515 10:40:10.383915 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.384103 kubelet[2060]: E0515 10:40:10.384089 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.384103 kubelet[2060]: W0515 10:40:10.384101 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.384195 kubelet[2060]: E0515 10:40:10.384167 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.384302 kubelet[2060]: E0515 10:40:10.384243 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.384302 kubelet[2060]: W0515 10:40:10.384248 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.384302 kubelet[2060]: E0515 10:40:10.384257 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.384453 kubelet[2060]: E0515 10:40:10.384426 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.384453 kubelet[2060]: W0515 10:40:10.384440 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.384453 kubelet[2060]: E0515 10:40:10.384450 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.384675 kubelet[2060]: E0515 10:40:10.384620 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.384675 kubelet[2060]: W0515 10:40:10.384628 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.384675 kubelet[2060]: E0515 10:40:10.384637 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.385006 kubelet[2060]: E0515 10:40:10.384986 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.385006 kubelet[2060]: W0515 10:40:10.385000 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.385006 kubelet[2060]: E0515 10:40:10.385010 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.391344 kubelet[2060]: E0515 10:40:10.391316 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.391344 kubelet[2060]: W0515 10:40:10.391331 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.391344 kubelet[2060]: E0515 10:40:10.391342 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.395727 kubelet[2060]: E0515 10:40:10.394915 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.395727 kubelet[2060]: W0515 10:40:10.394938 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.395727 kubelet[2060]: E0515 10:40:10.394959 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.473543 kubelet[2060]: E0515 10:40:10.473502 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.473543 kubelet[2060]: W0515 10:40:10.473530 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.473543 kubelet[2060]: E0515 10:40:10.473550 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.473784 kubelet[2060]: E0515 10:40:10.473755 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.473784 kubelet[2060]: W0515 10:40:10.473762 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.473784 kubelet[2060]: E0515 10:40:10.473776 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.473958 kubelet[2060]: E0515 10:40:10.473945 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.473958 kubelet[2060]: W0515 10:40:10.473953 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.474029 kubelet[2060]: E0515 10:40:10.473966 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.474127 kubelet[2060]: E0515 10:40:10.474114 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.474127 kubelet[2060]: W0515 10:40:10.474122 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.474198 kubelet[2060]: E0515 10:40:10.474136 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.474299 kubelet[2060]: E0515 10:40:10.474289 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.474299 kubelet[2060]: W0515 10:40:10.474296 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.474346 kubelet[2060]: E0515 10:40:10.474309 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.474595 kubelet[2060]: E0515 10:40:10.474564 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.474646 kubelet[2060]: W0515 10:40:10.474605 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.474646 kubelet[2060]: E0515 10:40:10.474637 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.474835 kubelet[2060]: E0515 10:40:10.474815 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.474835 kubelet[2060]: W0515 10:40:10.474826 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.474890 kubelet[2060]: E0515 10:40:10.474836 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.474985 kubelet[2060]: E0515 10:40:10.474972 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.474985 kubelet[2060]: W0515 10:40:10.474982 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.475033 kubelet[2060]: E0515 10:40:10.475008 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.475130 kubelet[2060]: E0515 10:40:10.475118 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.475159 kubelet[2060]: W0515 10:40:10.475130 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.475183 kubelet[2060]: E0515 10:40:10.475159 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.475294 kubelet[2060]: E0515 10:40:10.475281 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.475294 kubelet[2060]: W0515 10:40:10.475291 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.475344 kubelet[2060]: E0515 10:40:10.475311 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.475410 kubelet[2060]: E0515 10:40:10.475399 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.475410 kubelet[2060]: W0515 10:40:10.475407 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.475455 kubelet[2060]: E0515 10:40:10.475428 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.475535 kubelet[2060]: E0515 10:40:10.475517 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.475535 kubelet[2060]: W0515 10:40:10.475533 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.475585 kubelet[2060]: E0515 10:40:10.475553 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.475694 kubelet[2060]: E0515 10:40:10.475680 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.475694 kubelet[2060]: W0515 10:40:10.475690 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.475776 kubelet[2060]: E0515 10:40:10.475700 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.475855 kubelet[2060]: E0515 10:40:10.475842 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.475855 kubelet[2060]: W0515 10:40:10.475851 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.475904 kubelet[2060]: E0515 10:40:10.475861 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.476015 kubelet[2060]: E0515 10:40:10.476004 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.476015 kubelet[2060]: W0515 10:40:10.476013 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.476060 kubelet[2060]: E0515 10:40:10.476023 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.476282 kubelet[2060]: E0515 10:40:10.476266 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.476282 kubelet[2060]: W0515 10:40:10.476278 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.476354 kubelet[2060]: E0515 10:40:10.476291 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.476445 kubelet[2060]: E0515 10:40:10.476432 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.476445 kubelet[2060]: W0515 10:40:10.476441 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.476494 kubelet[2060]: E0515 10:40:10.476451 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.476632 kubelet[2060]: E0515 10:40:10.476617 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.476632 kubelet[2060]: W0515 10:40:10.476628 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.476720 kubelet[2060]: E0515 10:40:10.476676 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.476820 kubelet[2060]: E0515 10:40:10.476808 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.476851 kubelet[2060]: W0515 10:40:10.476819 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.476886 kubelet[2060]: E0515 10:40:10.476849 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.476974 kubelet[2060]: E0515 10:40:10.476963 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.476974 kubelet[2060]: W0515 10:40:10.476972 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.477034 kubelet[2060]: E0515 10:40:10.476998 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.477152 kubelet[2060]: E0515 10:40:10.477142 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.477176 kubelet[2060]: W0515 10:40:10.477152 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.477176 kubelet[2060]: E0515 10:40:10.477165 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.477348 kubelet[2060]: E0515 10:40:10.477331 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.477348 kubelet[2060]: W0515 10:40:10.477343 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.477426 kubelet[2060]: E0515 10:40:10.477357 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.477530 kubelet[2060]: E0515 10:40:10.477510 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.477555 kubelet[2060]: W0515 10:40:10.477529 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.477555 kubelet[2060]: E0515 10:40:10.477544 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.477744 kubelet[2060]: E0515 10:40:10.477732 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.477744 kubelet[2060]: W0515 10:40:10.477740 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.477809 kubelet[2060]: E0515 10:40:10.477752 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.477994 kubelet[2060]: E0515 10:40:10.477971 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.477994 kubelet[2060]: W0515 10:40:10.477984 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.477994 kubelet[2060]: E0515 10:40:10.477994 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.483502 kubelet[2060]: E0515 10:40:10.483478 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:10.485199 env[1205]: time="2025-05-15T10:40:10.484048294Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6dc9784fb8-clbrm,Uid:64c72f1f-d600-4ab9-a629-3e4df9f3ddb0,Namespace:calico-system,Attempt:0,}" May 15 10:40:10.488212 kubelet[2060]: E0515 10:40:10.488182 2060 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:40:10.488212 kubelet[2060]: W0515 10:40:10.488202 2060 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:40:10.488332 kubelet[2060]: E0515 10:40:10.488232 2060 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:40:10.525288 kubelet[2060]: E0515 10:40:10.525253 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:10.525700 env[1205]: time="2025-05-15T10:40:10.525639776Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fxdwx,Uid:bb6a67fe-212a-4e09-b11c-36a06fdfb3a4,Namespace:calico-system,Attempt:0,}" May 15 10:40:10.612800 env[1205]: time="2025-05-15T10:40:10.612603568Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:40:10.615983 env[1205]: time="2025-05-15T10:40:10.612832609Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:40:10.615983 env[1205]: time="2025-05-15T10:40:10.612868606Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:40:10.615983 env[1205]: time="2025-05-15T10:40:10.612877553Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:40:10.615983 env[1205]: time="2025-05-15T10:40:10.613053083Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d88a8af98c4266ef79679804acb4538fd38ba46a69772ac83b9e867653957424 pid=2520 runtime=io.containerd.runc.v2 May 15 10:40:10.615983 env[1205]: time="2025-05-15T10:40:10.612714937Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:40:10.615983 env[1205]: time="2025-05-15T10:40:10.612727110Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:40:10.616346 env[1205]: time="2025-05-15T10:40:10.616115892Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f5992dd7521ce60adb9ba32ea5ba34fd7f90d15b5a82d4718118515be37bd3e pid=2515 runtime=io.containerd.runc.v2 May 15 10:40:10.627372 systemd[1]: Started cri-containerd-8f5992dd7521ce60adb9ba32ea5ba34fd7f90d15b5a82d4718118515be37bd3e.scope. May 15 10:40:10.630402 systemd[1]: Started cri-containerd-d88a8af98c4266ef79679804acb4538fd38ba46a69772ac83b9e867653957424.scope. May 15 10:40:10.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.644000 audit: BPF prog-id=118 op=LOAD May 15 10:40:10.645000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2520 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438386138616639386334323636656637393637393830346163623435 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2520 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438386138616639386334323636656637393637393830346163623435 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit: BPF prog-id=119 op=LOAD May 15 10:40:10.645000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000edd90 items=0 ppid=2520 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438386138616639386334323636656637393637393830346163623435 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit: BPF prog-id=120 op=LOAD May 15 10:40:10.645000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000eddd8 items=0 ppid=2520 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438386138616639386334323636656637393637393830346163623435 May 15 10:40:10.645000 audit: BPF prog-id=120 op=UNLOAD May 15 10:40:10.645000 audit: BPF prog-id=119 op=UNLOAD May 15 10:40:10.645000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.645000 audit: BPF prog-id=121 op=LOAD May 15 10:40:10.645000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c81e8 items=0 ppid=2520 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438386138616639386334323636656637393637393830346163623435 May 15 10:40:10.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.648000 audit: BPF prog-id=122 op=LOAD May 15 10:40:10.650000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2515 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866353939326464373532316365363061646239626133326561356261 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2515 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866353939326464373532316365363061646239626133326561356261 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit: BPF prog-id=123 op=LOAD May 15 10:40:10.650000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00038c7c0 items=0 ppid=2515 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866353939326464373532316365363061646239626133326561356261 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.650000 audit: BPF prog-id=124 op=LOAD May 15 10:40:10.650000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00038c808 items=0 ppid=2515 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866353939326464373532316365363061646239626133326561356261 May 15 10:40:10.650000 audit: BPF prog-id=124 op=UNLOAD May 15 10:40:10.651000 audit: BPF prog-id=123 op=UNLOAD May 15 10:40:10.651000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.651000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.651000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.651000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.651000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.651000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.651000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.651000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.651000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.651000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:10.651000 audit: BPF prog-id=125 op=LOAD May 15 10:40:10.651000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00038cc18 items=0 ppid=2515 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866353939326464373532316365363061646239626133326561356261 May 15 10:40:10.663442 env[1205]: time="2025-05-15T10:40:10.663403185Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fxdwx,Uid:bb6a67fe-212a-4e09-b11c-36a06fdfb3a4,Namespace:calico-system,Attempt:0,} returns sandbox id \"d88a8af98c4266ef79679804acb4538fd38ba46a69772ac83b9e867653957424\"" May 15 10:40:10.665594 kubelet[2060]: E0515 10:40:10.665122 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:10.668214 env[1205]: time="2025-05-15T10:40:10.667912835Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 10:40:10.688278 env[1205]: time="2025-05-15T10:40:10.688227737Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6dc9784fb8-clbrm,Uid:64c72f1f-d600-4ab9-a629-3e4df9f3ddb0,Namespace:calico-system,Attempt:0,} returns sandbox id \"8f5992dd7521ce60adb9ba32ea5ba34fd7f90d15b5a82d4718118515be37bd3e\"" May 15 10:40:10.689287 kubelet[2060]: E0515 10:40:10.689254 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:11.134000 audit[2585]: NETFILTER_CFG table=filter:93 family=2 entries=18 op=nft_register_rule pid=2585 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:11.134000 audit[2585]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffda54454f0 a2=0 a3=7ffda54454dc items=0 ppid=2219 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:11.134000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:11.138000 audit[2585]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2585 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:11.138000 audit[2585]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffda54454f0 a2=0 a3=0 items=0 ppid=2219 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:11.138000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:12.030097 kubelet[2060]: E0515 10:40:12.030005 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6mxq2" podUID="832e5ea9-1687-4404-aa5d-bd6cc85411ec" May 15 10:40:13.506557 env[1205]: time="2025-05-15T10:40:13.506473206Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:13.508604 env[1205]: time="2025-05-15T10:40:13.508572853Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:13.510129 env[1205]: time="2025-05-15T10:40:13.510103049Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:13.511620 env[1205]: time="2025-05-15T10:40:13.511577701Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:13.512085 env[1205]: time="2025-05-15T10:40:13.512053234Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 10:40:13.513139 env[1205]: time="2025-05-15T10:40:13.512923560Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 15 10:40:13.515034 env[1205]: time="2025-05-15T10:40:13.515004712Z" level=info msg="CreateContainer within sandbox \"d88a8af98c4266ef79679804acb4538fd38ba46a69772ac83b9e867653957424\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 10:40:13.535341 env[1205]: time="2025-05-15T10:40:13.535275324Z" level=info msg="CreateContainer within sandbox \"d88a8af98c4266ef79679804acb4538fd38ba46a69772ac83b9e867653957424\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"644274e6c6891c040066ff5f1d01e1a60d4ba4f3a64c3907146bc566f26d62cf\"" May 15 10:40:13.535947 env[1205]: time="2025-05-15T10:40:13.535911519Z" level=info msg="StartContainer for \"644274e6c6891c040066ff5f1d01e1a60d4ba4f3a64c3907146bc566f26d62cf\"" May 15 10:40:13.553602 systemd[1]: Started cri-containerd-644274e6c6891c040066ff5f1d01e1a60d4ba4f3a64c3907146bc566f26d62cf.scope. May 15 10:40:13.562000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.562000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8fea875988 items=0 ppid=2520 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:13.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634343237346536633638393163303430303636666635663164303165 May 15 10:40:13.562000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.562000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.562000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.562000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.562000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.562000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.562000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.562000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.562000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.562000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.562000 audit: BPF prog-id=126 op=LOAD May 15 10:40:13.562000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000e1ba8 items=0 ppid=2520 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:13.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634343237346536633638393163303430303636666635663164303165 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit: BPF prog-id=127 op=LOAD May 15 10:40:13.563000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000e1bf8 items=0 ppid=2520 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:13.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634343237346536633638393163303430303636666635663164303165 May 15 10:40:13.563000 audit: BPF prog-id=127 op=UNLOAD May 15 10:40:13.563000 audit: BPF prog-id=126 op=UNLOAD May 15 10:40:13.563000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:13.563000 audit: BPF prog-id=128 op=LOAD May 15 10:40:13.563000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000e1c88 items=0 ppid=2520 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:13.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634343237346536633638393163303430303636666635663164303165 May 15 10:40:13.587936 systemd[1]: cri-containerd-644274e6c6891c040066ff5f1d01e1a60d4ba4f3a64c3907146bc566f26d62cf.scope: Deactivated successfully. May 15 10:40:13.590000 audit: BPF prog-id=128 op=UNLOAD May 15 10:40:13.733529 env[1205]: time="2025-05-15T10:40:13.733402900Z" level=info msg="StartContainer for \"644274e6c6891c040066ff5f1d01e1a60d4ba4f3a64c3907146bc566f26d62cf\" returns successfully" May 15 10:40:13.800893 env[1205]: time="2025-05-15T10:40:13.799457929Z" level=info msg="shim disconnected" id=644274e6c6891c040066ff5f1d01e1a60d4ba4f3a64c3907146bc566f26d62cf May 15 10:40:13.800893 env[1205]: time="2025-05-15T10:40:13.799510617Z" level=warning msg="cleaning up after shim disconnected" id=644274e6c6891c040066ff5f1d01e1a60d4ba4f3a64c3907146bc566f26d62cf namespace=k8s.io May 15 10:40:13.800893 env[1205]: time="2025-05-15T10:40:13.799520266Z" level=info msg="cleaning up dead shim" May 15 10:40:13.806561 env[1205]: time="2025-05-15T10:40:13.806516486Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:40:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2632 runtime=io.containerd.runc.v2\n" May 15 10:40:14.030234 kubelet[2060]: E0515 10:40:14.030182 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6mxq2" podUID="832e5ea9-1687-4404-aa5d-bd6cc85411ec" May 15 10:40:14.099576 kubelet[2060]: E0515 10:40:14.099166 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:14.525642 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-644274e6c6891c040066ff5f1d01e1a60d4ba4f3a64c3907146bc566f26d62cf-rootfs.mount: Deactivated successfully. May 15 10:40:16.030412 kubelet[2060]: E0515 10:40:16.030364 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6mxq2" podUID="832e5ea9-1687-4404-aa5d-bd6cc85411ec" May 15 10:40:17.020908 env[1205]: time="2025-05-15T10:40:17.020851267Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:17.023573 env[1205]: time="2025-05-15T10:40:17.023528677Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:17.025202 env[1205]: time="2025-05-15T10:40:17.025171613Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:17.026729 env[1205]: time="2025-05-15T10:40:17.026700385Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:17.027107 env[1205]: time="2025-05-15T10:40:17.027078707Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 15 10:40:17.028807 env[1205]: time="2025-05-15T10:40:17.028787397Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 10:40:17.039500 env[1205]: time="2025-05-15T10:40:17.039451401Z" level=info msg="CreateContainer within sandbox \"8f5992dd7521ce60adb9ba32ea5ba34fd7f90d15b5a82d4718118515be37bd3e\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 15 10:40:17.054324 env[1205]: time="2025-05-15T10:40:17.054286202Z" level=info msg="CreateContainer within sandbox \"8f5992dd7521ce60adb9ba32ea5ba34fd7f90d15b5a82d4718118515be37bd3e\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"f23a96f775578095b28a52b6dfa817c85858350c691733b448a62a389638d2f8\"" May 15 10:40:17.054802 env[1205]: time="2025-05-15T10:40:17.054765633Z" level=info msg="StartContainer for \"f23a96f775578095b28a52b6dfa817c85858350c691733b448a62a389638d2f8\"" May 15 10:40:17.068890 systemd[1]: Started cri-containerd-f23a96f775578095b28a52b6dfa817c85858350c691733b448a62a389638d2f8.scope. May 15 10:40:17.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.083494 kernel: kauditd_printk_skb: 166 callbacks suppressed May 15 10:40:17.083555 kernel: audit: type=1400 audit(1747305617.080:961): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.089910 kernel: audit: type=1400 audit(1747305617.080:962): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.089966 kernel: audit: type=1400 audit(1747305617.080:963): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.095816 kernel: audit: type=1400 audit(1747305617.080:964): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.095857 kernel: audit: type=1400 audit(1747305617.080:965): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.101832 kernel: audit: type=1400 audit(1747305617.080:966): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.101882 kernel: audit: type=1400 audit(1747305617.080:967): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.105134 kernel: audit: type=1400 audit(1747305617.080:968): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.108471 kernel: audit: type=1400 audit(1747305617.080:969): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.111350 kernel: audit: type=1400 audit(1747305617.082:970): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.082000 audit: BPF prog-id=129 op=LOAD May 15 10:40:17.083000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.083000 audit[2659]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2515 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:17.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632336139366637373535373830393562323861353262366466613831 May 15 10:40:17.083000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.083000 audit[2659]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2515 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:17.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632336139366637373535373830393562323861353262366466613831 May 15 10:40:17.083000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.083000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.083000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.083000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.083000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.083000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.083000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.083000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.083000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.083000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.083000 audit: BPF prog-id=130 op=LOAD May 15 10:40:17.083000 audit[2659]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000242ae0 items=0 ppid=2515 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:17.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632336139366637373535373830393562323861353262366466613831 May 15 10:40:17.085000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.085000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.085000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.085000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.085000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.085000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.085000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.085000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.085000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.085000 audit: BPF prog-id=131 op=LOAD May 15 10:40:17.085000 audit[2659]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000242b28 items=0 ppid=2515 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:17.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632336139366637373535373830393562323861353262366466613831 May 15 10:40:17.089000 audit: BPF prog-id=131 op=UNLOAD May 15 10:40:17.089000 audit: BPF prog-id=130 op=UNLOAD May 15 10:40:17.089000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.089000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.089000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.089000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.089000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.089000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.089000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.089000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.089000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.089000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:17.089000 audit: BPF prog-id=132 op=LOAD May 15 10:40:17.089000 audit[2659]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000242f38 items=0 ppid=2515 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:17.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632336139366637373535373830393562323861353262366466613831 May 15 10:40:17.131047 env[1205]: time="2025-05-15T10:40:17.131000879Z" level=info msg="StartContainer for \"f23a96f775578095b28a52b6dfa817c85858350c691733b448a62a389638d2f8\" returns successfully" May 15 10:40:17.606843 systemd[1]: Started sshd@7-10.0.0.58:22-10.0.0.1:45472.service. May 15 10:40:17.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.58:22-10.0.0.1:45472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:17.640000 audit[2694]: USER_ACCT pid=2694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:17.642827 sshd[2694]: Accepted publickey for core from 10.0.0.1 port 45472 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:17.641000 audit[2694]: CRED_ACQ pid=2694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:17.641000 audit[2694]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff15d60530 a2=3 a3=0 items=0 ppid=1 pid=2694 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:17.641000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:17.643731 sshd[2694]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:17.647253 systemd-logind[1195]: New session 8 of user core. May 15 10:40:17.648137 systemd[1]: Started session-8.scope. May 15 10:40:17.651000 audit[2694]: USER_START pid=2694 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:17.652000 audit[2696]: CRED_ACQ pid=2696 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:17.763296 sshd[2694]: pam_unix(sshd:session): session closed for user core May 15 10:40:17.762000 audit[2694]: USER_END pid=2694 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:17.762000 audit[2694]: CRED_DISP pid=2694 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:17.765616 systemd[1]: sshd@7-10.0.0.58:22-10.0.0.1:45472.service: Deactivated successfully. May 15 10:40:17.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.58:22-10.0.0.1:45472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:17.766339 systemd[1]: session-8.scope: Deactivated successfully. May 15 10:40:17.766804 systemd-logind[1195]: Session 8 logged out. Waiting for processes to exit. May 15 10:40:17.767377 systemd-logind[1195]: Removed session 8. May 15 10:40:18.035350 kubelet[2060]: E0515 10:40:18.035290 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6mxq2" podUID="832e5ea9-1687-4404-aa5d-bd6cc85411ec" May 15 10:40:18.110949 kubelet[2060]: E0515 10:40:18.110919 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:18.220684 kubelet[2060]: I0515 10:40:18.220332 2060 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6dc9784fb8-clbrm" podStartSLOduration=1.881633068 podStartE2EDuration="8.220312903s" podCreationTimestamp="2025-05-15 10:40:10 +0000 UTC" firstStartedPulling="2025-05-15 10:40:10.689942521 +0000 UTC m=+20.761164704" lastFinishedPulling="2025-05-15 10:40:17.028622356 +0000 UTC m=+27.099844539" observedRunningTime="2025-05-15 10:40:18.220165666 +0000 UTC m=+28.291387869" watchObservedRunningTime="2025-05-15 10:40:18.220312903 +0000 UTC m=+28.291535076" May 15 10:40:19.117048 kubelet[2060]: I0515 10:40:19.117011 2060 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:40:19.117587 kubelet[2060]: E0515 10:40:19.117568 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:20.031042 kubelet[2060]: E0515 10:40:20.030969 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6mxq2" podUID="832e5ea9-1687-4404-aa5d-bd6cc85411ec" May 15 10:40:22.029944 kubelet[2060]: E0515 10:40:22.029869 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6mxq2" podUID="832e5ea9-1687-4404-aa5d-bd6cc85411ec" May 15 10:40:22.767365 systemd[1]: Started sshd@8-10.0.0.58:22-10.0.0.1:45480.service. May 15 10:40:22.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.58:22-10.0.0.1:45480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:22.768354 kernel: kauditd_printk_skb: 58 callbacks suppressed May 15 10:40:22.768415 kernel: audit: type=1130 audit(1747305622.765:988): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.58:22-10.0.0.1:45480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:23.053000 audit[2709]: USER_ACCT pid=2709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.056116 sshd[2709]: Accepted publickey for core from 10.0.0.1 port 45480 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:23.058000 audit[2709]: CRED_ACQ pid=2709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.060385 sshd[2709]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:23.064347 kernel: audit: type=1101 audit(1747305623.053:989): pid=2709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.064420 kernel: audit: type=1103 audit(1747305623.058:990): pid=2709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.064439 kernel: audit: type=1006 audit(1747305623.058:991): pid=2709 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 15 10:40:23.066032 systemd[1]: Started session-9.scope. May 15 10:40:23.066426 systemd-logind[1195]: New session 9 of user core. May 15 10:40:23.058000 audit[2709]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde4189e10 a2=3 a3=0 items=0 ppid=1 pid=2709 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:23.072159 kernel: audit: type=1300 audit(1747305623.058:991): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde4189e10 a2=3 a3=0 items=0 ppid=1 pid=2709 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:23.072256 kernel: audit: type=1327 audit(1747305623.058:991): proctitle=737368643A20636F7265205B707269765D May 15 10:40:23.058000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:23.069000 audit[2709]: USER_START pid=2709 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.078466 kernel: audit: type=1105 audit(1747305623.069:992): pid=2709 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.078521 kernel: audit: type=1103 audit(1747305623.071:993): pid=2711 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.071000 audit[2711]: CRED_ACQ pid=2711 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.181506 sshd[2709]: pam_unix(sshd:session): session closed for user core May 15 10:40:23.190680 kernel: audit: type=1106 audit(1747305623.180:994): pid=2709 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.190771 kernel: audit: type=1104 audit(1747305623.180:995): pid=2709 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.180000 audit[2709]: USER_END pid=2709 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.180000 audit[2709]: CRED_DISP pid=2709 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.58:22-10.0.0.1:45480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:23.183792 systemd[1]: sshd@8-10.0.0.58:22-10.0.0.1:45480.service: Deactivated successfully. May 15 10:40:23.184523 systemd[1]: session-9.scope: Deactivated successfully. May 15 10:40:23.185274 systemd-logind[1195]: Session 9 logged out. Waiting for processes to exit. May 15 10:40:23.186202 systemd-logind[1195]: Removed session 9. May 15 10:40:24.029824 kubelet[2060]: E0515 10:40:24.029780 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6mxq2" podUID="832e5ea9-1687-4404-aa5d-bd6cc85411ec" May 15 10:40:25.793178 env[1205]: time="2025-05-15T10:40:25.793103645Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:25.795318 env[1205]: time="2025-05-15T10:40:25.795266036Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:25.797370 env[1205]: time="2025-05-15T10:40:25.797314221Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:25.798958 env[1205]: time="2025-05-15T10:40:25.798912421Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:25.799409 env[1205]: time="2025-05-15T10:40:25.799361324Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 10:40:25.801792 env[1205]: time="2025-05-15T10:40:25.801765387Z" level=info msg="CreateContainer within sandbox \"d88a8af98c4266ef79679804acb4538fd38ba46a69772ac83b9e867653957424\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 10:40:25.819104 env[1205]: time="2025-05-15T10:40:25.819035132Z" level=info msg="CreateContainer within sandbox \"d88a8af98c4266ef79679804acb4538fd38ba46a69772ac83b9e867653957424\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"4e72d2c42a499d162e367f42e7ea07dd4048a5c079efe1c6ea09d32e855df5cd\"" May 15 10:40:25.820602 env[1205]: time="2025-05-15T10:40:25.820525750Z" level=info msg="StartContainer for \"4e72d2c42a499d162e367f42e7ea07dd4048a5c079efe1c6ea09d32e855df5cd\"" May 15 10:40:25.844885 systemd[1]: Started cri-containerd-4e72d2c42a499d162e367f42e7ea07dd4048a5c079efe1c6ea09d32e855df5cd.scope. May 15 10:40:25.881000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f48bc51ff88 items=0 ppid=2520 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:25.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465373264326334326134393964313632653336376634326537656130 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit: BPF prog-id=133 op=LOAD May 15 10:40:25.881000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000305058 items=0 ppid=2520 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:25.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465373264326334326134393964313632653336376634326537656130 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.881000 audit: BPF prog-id=134 op=LOAD May 15 10:40:25.881000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003050a8 items=0 ppid=2520 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:25.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465373264326334326134393964313632653336376634326537656130 May 15 10:40:25.882000 audit: BPF prog-id=134 op=UNLOAD May 15 10:40:25.882000 audit: BPF prog-id=133 op=UNLOAD May 15 10:40:25.882000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.882000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.882000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.882000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.882000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.882000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.882000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.882000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.882000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.882000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:25.882000 audit: BPF prog-id=135 op=LOAD May 15 10:40:25.882000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000305138 items=0 ppid=2520 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:25.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465373264326334326134393964313632653336376634326537656130 May 15 10:40:26.030535 kubelet[2060]: E0515 10:40:26.030449 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6mxq2" podUID="832e5ea9-1687-4404-aa5d-bd6cc85411ec" May 15 10:40:26.314333 env[1205]: time="2025-05-15T10:40:26.314256295Z" level=info msg="StartContainer for \"4e72d2c42a499d162e367f42e7ea07dd4048a5c079efe1c6ea09d32e855df5cd\" returns successfully" May 15 10:40:27.319250 kubelet[2060]: E0515 10:40:27.319217 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:27.482425 env[1205]: time="2025-05-15T10:40:27.482347638Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:40:27.484206 systemd[1]: cri-containerd-4e72d2c42a499d162e367f42e7ea07dd4048a5c079efe1c6ea09d32e855df5cd.scope: Deactivated successfully. May 15 10:40:27.487000 audit: BPF prog-id=135 op=UNLOAD May 15 10:40:27.501299 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4e72d2c42a499d162e367f42e7ea07dd4048a5c079efe1c6ea09d32e855df5cd-rootfs.mount: Deactivated successfully. May 15 10:40:27.582680 kubelet[2060]: I0515 10:40:27.582552 2060 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 15 10:40:27.633926 env[1205]: time="2025-05-15T10:40:27.633864270Z" level=info msg="shim disconnected" id=4e72d2c42a499d162e367f42e7ea07dd4048a5c079efe1c6ea09d32e855df5cd May 15 10:40:27.633926 env[1205]: time="2025-05-15T10:40:27.633928832Z" level=warning msg="cleaning up after shim disconnected" id=4e72d2c42a499d162e367f42e7ea07dd4048a5c079efe1c6ea09d32e855df5cd namespace=k8s.io May 15 10:40:27.633926 env[1205]: time="2025-05-15T10:40:27.633938590Z" level=info msg="cleaning up dead shim" May 15 10:40:27.646457 kubelet[2060]: I0515 10:40:27.645996 2060 topology_manager.go:215] "Topology Admit Handler" podUID="d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d" podNamespace="kube-system" podName="coredns-7db6d8ff4d-tbr5q" May 15 10:40:27.655909 kubelet[2060]: I0515 10:40:27.655871 2060 topology_manager.go:215] "Topology Admit Handler" podUID="a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0" podNamespace="kube-system" podName="coredns-7db6d8ff4d-jhsth" May 15 10:40:27.656698 kubelet[2060]: I0515 10:40:27.656643 2060 topology_manager.go:215] "Topology Admit Handler" podUID="6f53a062-ebf2-46b9-8b99-8fafa7e0b001" podNamespace="calico-system" podName="calico-kube-controllers-78ddbbc6d7-fq45l" May 15 10:40:27.656949 kubelet[2060]: I0515 10:40:27.656919 2060 topology_manager.go:215] "Topology Admit Handler" podUID="fcb83224-37f0-4883-9e08-98a8f6194cef" podNamespace="calico-apiserver" podName="calico-apiserver-85fd7b7cb7-h2mp7" May 15 10:40:27.657459 kubelet[2060]: I0515 10:40:27.657431 2060 topology_manager.go:215] "Topology Admit Handler" podUID="372820ce-5c22-42ae-a0c2-10ca7c493652" podNamespace="calico-apiserver" podName="calico-apiserver-85fd7b7cb7-vgq28" May 15 10:40:27.665307 env[1205]: time="2025-05-15T10:40:27.665243709Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:40:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2772 runtime=io.containerd.runc.v2\n" May 15 10:40:27.665693 systemd[1]: Created slice kubepods-burstable-podd646a4fa_1a9e_42e5_9274_4bcb2d4fa87d.slice. May 15 10:40:27.673742 systemd[1]: Created slice kubepods-burstable-poda8b822f4_805e_4fc3_b7a9_8b4fcd0e8ac0.slice. May 15 10:40:27.686395 systemd[1]: Created slice kubepods-besteffort-pod6f53a062_ebf2_46b9_8b99_8fafa7e0b001.slice. May 15 10:40:27.702801 systemd[1]: Created slice kubepods-besteffort-podfcb83224_37f0_4883_9e08_98a8f6194cef.slice. May 15 10:40:27.708495 systemd[1]: Created slice kubepods-besteffort-pod372820ce_5c22_42ae_a0c2_10ca7c493652.slice. May 15 10:40:27.792881 kubelet[2060]: I0515 10:40:27.792834 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0-config-volume\") pod \"coredns-7db6d8ff4d-jhsth\" (UID: \"a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0\") " pod="kube-system/coredns-7db6d8ff4d-jhsth" May 15 10:40:27.792881 kubelet[2060]: I0515 10:40:27.792871 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d-config-volume\") pod \"coredns-7db6d8ff4d-tbr5q\" (UID: \"d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d\") " pod="kube-system/coredns-7db6d8ff4d-tbr5q" May 15 10:40:27.792881 kubelet[2060]: I0515 10:40:27.792894 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/372820ce-5c22-42ae-a0c2-10ca7c493652-calico-apiserver-certs\") pod \"calico-apiserver-85fd7b7cb7-vgq28\" (UID: \"372820ce-5c22-42ae-a0c2-10ca7c493652\") " pod="calico-apiserver/calico-apiserver-85fd7b7cb7-vgq28" May 15 10:40:27.793154 kubelet[2060]: I0515 10:40:27.792916 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ktg2g\" (UniqueName: \"kubernetes.io/projected/a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0-kube-api-access-ktg2g\") pod \"coredns-7db6d8ff4d-jhsth\" (UID: \"a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0\") " pod="kube-system/coredns-7db6d8ff4d-jhsth" May 15 10:40:27.793154 kubelet[2060]: I0515 10:40:27.792935 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dnxkv\" (UniqueName: \"kubernetes.io/projected/6f53a062-ebf2-46b9-8b99-8fafa7e0b001-kube-api-access-dnxkv\") pod \"calico-kube-controllers-78ddbbc6d7-fq45l\" (UID: \"6f53a062-ebf2-46b9-8b99-8fafa7e0b001\") " pod="calico-system/calico-kube-controllers-78ddbbc6d7-fq45l" May 15 10:40:27.793154 kubelet[2060]: I0515 10:40:27.792952 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/fcb83224-37f0-4883-9e08-98a8f6194cef-calico-apiserver-certs\") pod \"calico-apiserver-85fd7b7cb7-h2mp7\" (UID: \"fcb83224-37f0-4883-9e08-98a8f6194cef\") " pod="calico-apiserver/calico-apiserver-85fd7b7cb7-h2mp7" May 15 10:40:27.793154 kubelet[2060]: I0515 10:40:27.792969 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n2cqv\" (UniqueName: \"kubernetes.io/projected/372820ce-5c22-42ae-a0c2-10ca7c493652-kube-api-access-n2cqv\") pod \"calico-apiserver-85fd7b7cb7-vgq28\" (UID: \"372820ce-5c22-42ae-a0c2-10ca7c493652\") " pod="calico-apiserver/calico-apiserver-85fd7b7cb7-vgq28" May 15 10:40:27.793154 kubelet[2060]: I0515 10:40:27.792986 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6f53a062-ebf2-46b9-8b99-8fafa7e0b001-tigera-ca-bundle\") pod \"calico-kube-controllers-78ddbbc6d7-fq45l\" (UID: \"6f53a062-ebf2-46b9-8b99-8fafa7e0b001\") " pod="calico-system/calico-kube-controllers-78ddbbc6d7-fq45l" May 15 10:40:27.793348 kubelet[2060]: I0515 10:40:27.793182 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-22sjv\" (UniqueName: \"kubernetes.io/projected/d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d-kube-api-access-22sjv\") pod \"coredns-7db6d8ff4d-tbr5q\" (UID: \"d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d\") " pod="kube-system/coredns-7db6d8ff4d-tbr5q" May 15 10:40:27.793390 kubelet[2060]: I0515 10:40:27.793361 2060 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bhfvq\" (UniqueName: \"kubernetes.io/projected/fcb83224-37f0-4883-9e08-98a8f6194cef-kube-api-access-bhfvq\") pod \"calico-apiserver-85fd7b7cb7-h2mp7\" (UID: \"fcb83224-37f0-4883-9e08-98a8f6194cef\") " pod="calico-apiserver/calico-apiserver-85fd7b7cb7-h2mp7" May 15 10:40:27.970310 kubelet[2060]: E0515 10:40:27.970272 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:27.970998 env[1205]: time="2025-05-15T10:40:27.970960732Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-tbr5q,Uid:d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d,Namespace:kube-system,Attempt:0,}" May 15 10:40:27.983881 kubelet[2060]: E0515 10:40:27.983862 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:27.984842 env[1205]: time="2025-05-15T10:40:27.984799502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-jhsth,Uid:a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0,Namespace:kube-system,Attempt:0,}" May 15 10:40:27.995106 env[1205]: time="2025-05-15T10:40:27.995042901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78ddbbc6d7-fq45l,Uid:6f53a062-ebf2-46b9-8b99-8fafa7e0b001,Namespace:calico-system,Attempt:0,}" May 15 10:40:28.006445 env[1205]: time="2025-05-15T10:40:28.006392548Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85fd7b7cb7-h2mp7,Uid:fcb83224-37f0-4883-9e08-98a8f6194cef,Namespace:calico-apiserver,Attempt:0,}" May 15 10:40:28.013591 env[1205]: time="2025-05-15T10:40:28.013546136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85fd7b7cb7-vgq28,Uid:372820ce-5c22-42ae-a0c2-10ca7c493652,Namespace:calico-apiserver,Attempt:0,}" May 15 10:40:28.035837 systemd[1]: Created slice kubepods-besteffort-pod832e5ea9_1687_4404_aa5d_bd6cc85411ec.slice. May 15 10:40:28.038077 env[1205]: time="2025-05-15T10:40:28.038028264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6mxq2,Uid:832e5ea9-1687-4404-aa5d-bd6cc85411ec,Namespace:calico-system,Attempt:0,}" May 15 10:40:28.100960 env[1205]: time="2025-05-15T10:40:28.100894566Z" level=error msg="Failed to destroy network for sandbox \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.101461 env[1205]: time="2025-05-15T10:40:28.101434019Z" level=error msg="encountered an error cleaning up failed sandbox \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.101579 env[1205]: time="2025-05-15T10:40:28.101549286Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-jhsth,Uid:a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.102813 kubelet[2060]: E0515 10:40:28.101888 2060 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.102813 kubelet[2060]: E0515 10:40:28.101961 2060 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-jhsth" May 15 10:40:28.102813 kubelet[2060]: E0515 10:40:28.101982 2060 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-jhsth" May 15 10:40:28.102951 kubelet[2060]: E0515 10:40:28.102027 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-jhsth_kube-system(a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-jhsth_kube-system(a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-jhsth" podUID="a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0" May 15 10:40:28.119754 env[1205]: time="2025-05-15T10:40:28.119699447Z" level=error msg="Failed to destroy network for sandbox \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.120189 env[1205]: time="2025-05-15T10:40:28.120162637Z" level=error msg="encountered an error cleaning up failed sandbox \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.120354 env[1205]: time="2025-05-15T10:40:28.120325943Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78ddbbc6d7-fq45l,Uid:6f53a062-ebf2-46b9-8b99-8fafa7e0b001,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.121589 kubelet[2060]: E0515 10:40:28.120643 2060 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.121589 kubelet[2060]: E0515 10:40:28.120722 2060 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-78ddbbc6d7-fq45l" May 15 10:40:28.121589 kubelet[2060]: E0515 10:40:28.120745 2060 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-78ddbbc6d7-fq45l" May 15 10:40:28.121734 kubelet[2060]: E0515 10:40:28.120785 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-78ddbbc6d7-fq45l_calico-system(6f53a062-ebf2-46b9-8b99-8fafa7e0b001)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-78ddbbc6d7-fq45l_calico-system(6f53a062-ebf2-46b9-8b99-8fafa7e0b001)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-78ddbbc6d7-fq45l" podUID="6f53a062-ebf2-46b9-8b99-8fafa7e0b001" May 15 10:40:28.122007 env[1205]: time="2025-05-15T10:40:28.121967335Z" level=error msg="Failed to destroy network for sandbox \"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.122504 env[1205]: time="2025-05-15T10:40:28.122471742Z" level=error msg="encountered an error cleaning up failed sandbox \"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.122670 env[1205]: time="2025-05-15T10:40:28.122623547Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-tbr5q,Uid:d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.122988 kubelet[2060]: E0515 10:40:28.122951 2060 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.123056 kubelet[2060]: E0515 10:40:28.123010 2060 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-tbr5q" May 15 10:40:28.123056 kubelet[2060]: E0515 10:40:28.123029 2060 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-tbr5q" May 15 10:40:28.123139 kubelet[2060]: E0515 10:40:28.123070 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-tbr5q_kube-system(d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-tbr5q_kube-system(d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-tbr5q" podUID="d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d" May 15 10:40:28.147132 env[1205]: time="2025-05-15T10:40:28.147066090Z" level=error msg="Failed to destroy network for sandbox \"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.147429 env[1205]: time="2025-05-15T10:40:28.147399176Z" level=error msg="encountered an error cleaning up failed sandbox \"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.147471 env[1205]: time="2025-05-15T10:40:28.147447566Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85fd7b7cb7-h2mp7,Uid:fcb83224-37f0-4883-9e08-98a8f6194cef,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.147702 kubelet[2060]: E0515 10:40:28.147673 2060 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.147780 kubelet[2060]: E0515 10:40:28.147732 2060 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-85fd7b7cb7-h2mp7" May 15 10:40:28.147780 kubelet[2060]: E0515 10:40:28.147752 2060 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-85fd7b7cb7-h2mp7" May 15 10:40:28.147833 kubelet[2060]: E0515 10:40:28.147797 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-85fd7b7cb7-h2mp7_calico-apiserver(fcb83224-37f0-4883-9e08-98a8f6194cef)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-85fd7b7cb7-h2mp7_calico-apiserver(fcb83224-37f0-4883-9e08-98a8f6194cef)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-85fd7b7cb7-h2mp7" podUID="fcb83224-37f0-4883-9e08-98a8f6194cef" May 15 10:40:28.156438 env[1205]: time="2025-05-15T10:40:28.156363694Z" level=error msg="Failed to destroy network for sandbox \"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.156784 env[1205]: time="2025-05-15T10:40:28.156749067Z" level=error msg="encountered an error cleaning up failed sandbox \"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.156848 env[1205]: time="2025-05-15T10:40:28.156823126Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6mxq2,Uid:832e5ea9-1687-4404-aa5d-bd6cc85411ec,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.157112 kubelet[2060]: E0515 10:40:28.157064 2060 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.157199 kubelet[2060]: E0515 10:40:28.157124 2060 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6mxq2" May 15 10:40:28.157199 kubelet[2060]: E0515 10:40:28.157143 2060 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6mxq2" May 15 10:40:28.157199 kubelet[2060]: E0515 10:40:28.157186 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-6mxq2_calico-system(832e5ea9-1687-4404-aa5d-bd6cc85411ec)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-6mxq2_calico-system(832e5ea9-1687-4404-aa5d-bd6cc85411ec)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6mxq2" podUID="832e5ea9-1687-4404-aa5d-bd6cc85411ec" May 15 10:40:28.157795 env[1205]: time="2025-05-15T10:40:28.157757610Z" level=error msg="Failed to destroy network for sandbox \"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.158069 env[1205]: time="2025-05-15T10:40:28.158033549Z" level=error msg="encountered an error cleaning up failed sandbox \"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.158138 env[1205]: time="2025-05-15T10:40:28.158083883Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85fd7b7cb7-vgq28,Uid:372820ce-5c22-42ae-a0c2-10ca7c493652,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.158230 kubelet[2060]: E0515 10:40:28.158209 2060 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.158304 kubelet[2060]: E0515 10:40:28.158245 2060 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-85fd7b7cb7-vgq28" May 15 10:40:28.158304 kubelet[2060]: E0515 10:40:28.158259 2060 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-85fd7b7cb7-vgq28" May 15 10:40:28.158304 kubelet[2060]: E0515 10:40:28.158284 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-85fd7b7cb7-vgq28_calico-apiserver(372820ce-5c22-42ae-a0c2-10ca7c493652)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-85fd7b7cb7-vgq28_calico-apiserver(372820ce-5c22-42ae-a0c2-10ca7c493652)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-85fd7b7cb7-vgq28" podUID="372820ce-5c22-42ae-a0c2-10ca7c493652" May 15 10:40:28.184820 systemd[1]: Started sshd@9-10.0.0.58:22-10.0.0.1:43184.service. May 15 10:40:28.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.58:22-10.0.0.1:43184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:28.186104 kernel: kauditd_printk_skb: 45 callbacks suppressed May 15 10:40:28.186191 kernel: audit: type=1130 audit(1747305628.183:1004): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.58:22-10.0.0.1:43184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:28.215000 audit[3021]: USER_ACCT pid=3021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.217787 sshd[3021]: Accepted publickey for core from 10.0.0.1 port 43184 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:28.221682 kernel: audit: type=1101 audit(1747305628.215:1005): pid=3021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.221740 kernel: audit: type=1103 audit(1747305628.219:1006): pid=3021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.219000 audit[3021]: CRED_ACQ pid=3021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.222136 sshd[3021]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:28.226027 systemd-logind[1195]: New session 10 of user core. May 15 10:40:28.226988 systemd[1]: Started session-10.scope. May 15 10:40:28.228543 kernel: audit: type=1006 audit(1747305628.220:1007): pid=3021 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 15 10:40:28.228608 kernel: audit: type=1300 audit(1747305628.220:1007): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd75107350 a2=3 a3=0 items=0 ppid=1 pid=3021 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:28.220000 audit[3021]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd75107350 a2=3 a3=0 items=0 ppid=1 pid=3021 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:28.232415 kernel: audit: type=1327 audit(1747305628.220:1007): proctitle=737368643A20636F7265205B707269765D May 15 10:40:28.220000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:28.233738 kernel: audit: type=1105 audit(1747305628.229:1008): pid=3021 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.229000 audit[3021]: USER_START pid=3021 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.237874 kernel: audit: type=1103 audit(1747305628.230:1009): pid=3023 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.230000 audit[3023]: CRED_ACQ pid=3023 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.327142 kubelet[2060]: I0515 10:40:28.326923 2060 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a" May 15 10:40:28.330400 env[1205]: time="2025-05-15T10:40:28.330001998Z" level=info msg="StopPodSandbox for \"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\"" May 15 10:40:28.331829 kubelet[2060]: I0515 10:40:28.331265 2060 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761" May 15 10:40:28.332107 env[1205]: time="2025-05-15T10:40:28.332070701Z" level=info msg="StopPodSandbox for \"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\"" May 15 10:40:28.333892 kubelet[2060]: I0515 10:40:28.333863 2060 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" May 15 10:40:28.334548 env[1205]: time="2025-05-15T10:40:28.334515100Z" level=info msg="StopPodSandbox for \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\"" May 15 10:40:28.336259 kubelet[2060]: I0515 10:40:28.336190 2060 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98" May 15 10:40:28.336908 env[1205]: time="2025-05-15T10:40:28.336874028Z" level=info msg="StopPodSandbox for \"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\"" May 15 10:40:28.338632 kubelet[2060]: I0515 10:40:28.338289 2060 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" May 15 10:40:28.339085 env[1205]: time="2025-05-15T10:40:28.339060883Z" level=info msg="StopPodSandbox for \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\"" May 15 10:40:28.340220 kubelet[2060]: I0515 10:40:28.340104 2060 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4" May 15 10:40:28.340794 env[1205]: time="2025-05-15T10:40:28.340766886Z" level=info msg="StopPodSandbox for \"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\"" May 15 10:40:28.342808 kubelet[2060]: E0515 10:40:28.342778 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:28.343802 sshd[3021]: pam_unix(sshd:session): session closed for user core May 15 10:40:28.344073 env[1205]: time="2025-05-15T10:40:28.344039740Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 10:40:28.343000 audit[3021]: USER_END pid=3021 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.346179 systemd[1]: sshd@9-10.0.0.58:22-10.0.0.1:43184.service: Deactivated successfully. May 15 10:40:28.349464 systemd-logind[1195]: Session 10 logged out. Waiting for processes to exit. May 15 10:40:28.351707 kernel: audit: type=1106 audit(1747305628.343:1010): pid=3021 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.351783 kernel: audit: type=1104 audit(1747305628.343:1011): pid=3021 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.343000 audit[3021]: CRED_DISP pid=3021 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.356110 systemd[1]: session-10.scope: Deactivated successfully. May 15 10:40:28.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.58:22-10.0.0.1:43184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:28.357251 systemd-logind[1195]: Removed session 10. May 15 10:40:28.395297 env[1205]: time="2025-05-15T10:40:28.395223762Z" level=error msg="StopPodSandbox for \"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\" failed" error="failed to destroy network for sandbox \"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.395545 kubelet[2060]: E0515 10:40:28.395501 2060 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761" May 15 10:40:28.395687 kubelet[2060]: E0515 10:40:28.395627 2060 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761"} May 15 10:40:28.395756 kubelet[2060]: E0515 10:40:28.395706 2060 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:40:28.395756 kubelet[2060]: E0515 10:40:28.395731 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-tbr5q" podUID="d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d" May 15 10:40:28.400907 env[1205]: time="2025-05-15T10:40:28.400841428Z" level=error msg="StopPodSandbox for \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\" failed" error="failed to destroy network for sandbox \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.401092 kubelet[2060]: E0515 10:40:28.401060 2060 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" May 15 10:40:28.401149 kubelet[2060]: E0515 10:40:28.401092 2060 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3"} May 15 10:40:28.401149 kubelet[2060]: E0515 10:40:28.401121 2060 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:40:28.401258 kubelet[2060]: E0515 10:40:28.401139 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-jhsth" podUID="a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0" May 15 10:40:28.408366 env[1205]: time="2025-05-15T10:40:28.408310018Z" level=error msg="StopPodSandbox for \"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\" failed" error="failed to destroy network for sandbox \"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.408796 kubelet[2060]: E0515 10:40:28.408738 2060 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98" May 15 10:40:28.408864 kubelet[2060]: E0515 10:40:28.408799 2060 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98"} May 15 10:40:28.408864 kubelet[2060]: E0515 10:40:28.408834 2060 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"372820ce-5c22-42ae-a0c2-10ca7c493652\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:40:28.408864 kubelet[2060]: E0515 10:40:28.408855 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"372820ce-5c22-42ae-a0c2-10ca7c493652\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-85fd7b7cb7-vgq28" podUID="372820ce-5c22-42ae-a0c2-10ca7c493652" May 15 10:40:28.409084 env[1205]: time="2025-05-15T10:40:28.409056529Z" level=error msg="StopPodSandbox for \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\" failed" error="failed to destroy network for sandbox \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.409289 kubelet[2060]: E0515 10:40:28.409258 2060 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" May 15 10:40:28.409289 kubelet[2060]: E0515 10:40:28.409283 2060 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771"} May 15 10:40:28.409368 kubelet[2060]: E0515 10:40:28.409303 2060 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6f53a062-ebf2-46b9-8b99-8fafa7e0b001\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:40:28.409368 kubelet[2060]: E0515 10:40:28.409329 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6f53a062-ebf2-46b9-8b99-8fafa7e0b001\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-78ddbbc6d7-fq45l" podUID="6f53a062-ebf2-46b9-8b99-8fafa7e0b001" May 15 10:40:28.415320 env[1205]: time="2025-05-15T10:40:28.415271005Z" level=error msg="StopPodSandbox for \"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\" failed" error="failed to destroy network for sandbox \"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.415570 kubelet[2060]: E0515 10:40:28.415518 2060 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a" May 15 10:40:28.415629 kubelet[2060]: E0515 10:40:28.415581 2060 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a"} May 15 10:40:28.415629 kubelet[2060]: E0515 10:40:28.415617 2060 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fcb83224-37f0-4883-9e08-98a8f6194cef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:40:28.415731 kubelet[2060]: E0515 10:40:28.415647 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fcb83224-37f0-4883-9e08-98a8f6194cef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-85fd7b7cb7-h2mp7" podUID="fcb83224-37f0-4883-9e08-98a8f6194cef" May 15 10:40:28.421190 env[1205]: time="2025-05-15T10:40:28.421147256Z" level=error msg="StopPodSandbox for \"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\" failed" error="failed to destroy network for sandbox \"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:28.421410 kubelet[2060]: E0515 10:40:28.421359 2060 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4" May 15 10:40:28.421464 kubelet[2060]: E0515 10:40:28.421413 2060 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4"} May 15 10:40:28.421464 kubelet[2060]: E0515 10:40:28.421453 2060 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"832e5ea9-1687-4404-aa5d-bd6cc85411ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:40:28.421545 kubelet[2060]: E0515 10:40:28.421476 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"832e5ea9-1687-4404-aa5d-bd6cc85411ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6mxq2" podUID="832e5ea9-1687-4404-aa5d-bd6cc85411ec" May 15 10:40:33.345700 systemd[1]: Started sshd@10-10.0.0.58:22-10.0.0.1:43194.service. May 15 10:40:33.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.58:22-10.0.0.1:43194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:33.347026 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:40:33.347091 kernel: audit: type=1130 audit(1747305633.344:1013): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.58:22-10.0.0.1:43194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:33.377000 audit[3176]: USER_ACCT pid=3176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.379311 sshd[3176]: Accepted publickey for core from 10.0.0.1 port 43194 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:33.381000 audit[3176]: CRED_ACQ pid=3176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.383611 sshd[3176]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:33.387017 kernel: audit: type=1101 audit(1747305633.377:1014): pid=3176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.387119 kernel: audit: type=1103 audit(1747305633.381:1015): pid=3176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.387142 kernel: audit: type=1006 audit(1747305633.381:1016): pid=3176 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 15 10:40:33.387929 systemd-logind[1195]: New session 11 of user core. May 15 10:40:33.388060 systemd[1]: Started session-11.scope. May 15 10:40:33.381000 audit[3176]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc1e64530 a2=3 a3=0 items=0 ppid=1 pid=3176 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:33.393584 kernel: audit: type=1300 audit(1747305633.381:1016): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc1e64530 a2=3 a3=0 items=0 ppid=1 pid=3176 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:33.381000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:33.395047 kernel: audit: type=1327 audit(1747305633.381:1016): proctitle=737368643A20636F7265205B707269765D May 15 10:40:33.390000 audit[3176]: USER_START pid=3176 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.399543 kernel: audit: type=1105 audit(1747305633.390:1017): pid=3176 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.392000 audit[3178]: CRED_ACQ pid=3178 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.403087 kernel: audit: type=1103 audit(1747305633.392:1018): pid=3178 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.506511 sshd[3176]: pam_unix(sshd:session): session closed for user core May 15 10:40:33.505000 audit[3176]: USER_END pid=3176 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.510257 systemd[1]: Started sshd@11-10.0.0.58:22-10.0.0.1:50992.service. May 15 10:40:33.507000 audit[3176]: CRED_DISP pid=3176 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.515790 kernel: audit: type=1106 audit(1747305633.505:1019): pid=3176 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.515840 kernel: audit: type=1104 audit(1747305633.507:1020): pid=3176 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.58:22-10.0.0.1:50992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:33.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.58:22-10.0.0.1:43194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:33.512490 systemd[1]: sshd@10-10.0.0.58:22-10.0.0.1:43194.service: Deactivated successfully. May 15 10:40:33.513139 systemd[1]: session-11.scope: Deactivated successfully. May 15 10:40:33.513907 systemd-logind[1195]: Session 11 logged out. Waiting for processes to exit. May 15 10:40:33.514637 systemd-logind[1195]: Removed session 11. May 15 10:40:33.539000 audit[3189]: USER_ACCT pid=3189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.541523 sshd[3189]: Accepted publickey for core from 10.0.0.1 port 50992 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:33.540000 audit[3189]: CRED_ACQ pid=3189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.540000 audit[3189]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc51fefcb0 a2=3 a3=0 items=0 ppid=1 pid=3189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:33.540000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:33.542601 sshd[3189]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:33.546267 systemd-logind[1195]: New session 12 of user core. May 15 10:40:33.547028 systemd[1]: Started session-12.scope. May 15 10:40:33.549000 audit[3189]: USER_START pid=3189 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.551000 audit[3192]: CRED_ACQ pid=3192 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.696040 sshd[3189]: pam_unix(sshd:session): session closed for user core May 15 10:40:33.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.58:22-10.0.0.1:51004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:33.699309 systemd[1]: Started sshd@12-10.0.0.58:22-10.0.0.1:51004.service. May 15 10:40:33.702000 audit[3189]: USER_END pid=3189 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.702000 audit[3189]: CRED_DISP pid=3189 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.706591 systemd[1]: sshd@11-10.0.0.58:22-10.0.0.1:50992.service: Deactivated successfully. May 15 10:40:33.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.58:22-10.0.0.1:50992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:33.707526 systemd[1]: session-12.scope: Deactivated successfully. May 15 10:40:33.709191 systemd-logind[1195]: Session 12 logged out. Waiting for processes to exit. May 15 10:40:33.710082 systemd-logind[1195]: Removed session 12. May 15 10:40:33.742000 audit[3200]: USER_ACCT pid=3200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.744101 sshd[3200]: Accepted publickey for core from 10.0.0.1 port 51004 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:33.743000 audit[3200]: CRED_ACQ pid=3200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.743000 audit[3200]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd13796d80 a2=3 a3=0 items=0 ppid=1 pid=3200 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:33.743000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:33.745303 sshd[3200]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:33.748877 systemd-logind[1195]: New session 13 of user core. May 15 10:40:33.749599 systemd[1]: Started session-13.scope. May 15 10:40:33.752000 audit[3200]: USER_START pid=3200 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.753000 audit[3203]: CRED_ACQ pid=3203 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.859550 sshd[3200]: pam_unix(sshd:session): session closed for user core May 15 10:40:33.859000 audit[3200]: USER_END pid=3200 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.859000 audit[3200]: CRED_DISP pid=3200 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:33.862309 systemd[1]: sshd@12-10.0.0.58:22-10.0.0.1:51004.service: Deactivated successfully. May 15 10:40:33.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.58:22-10.0.0.1:51004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:33.863211 systemd[1]: session-13.scope: Deactivated successfully. May 15 10:40:33.864124 systemd-logind[1195]: Session 13 logged out. Waiting for processes to exit. May 15 10:40:33.865004 systemd-logind[1195]: Removed session 13. May 15 10:40:34.543776 kubelet[2060]: I0515 10:40:34.543738 2060 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:40:34.544334 kubelet[2060]: E0515 10:40:34.544308 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:34.572000 audit[3219]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3219 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:34.572000 audit[3219]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd80fff9f0 a2=0 a3=7ffd80fff9dc items=0 ppid=2219 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:34.572000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:34.577000 audit[3219]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3219 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:34.577000 audit[3219]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd80fff9f0 a2=0 a3=7ffd80fff9dc items=0 ppid=2219 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:34.577000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:35.355835 kubelet[2060]: E0515 10:40:35.355725 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:38.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.58:22-10.0.0.1:51020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:38.863779 systemd[1]: Started sshd@13-10.0.0.58:22-10.0.0.1:51020.service. May 15 10:40:38.865037 kernel: kauditd_printk_skb: 29 callbacks suppressed May 15 10:40:38.865085 kernel: audit: type=1130 audit(1747305638.862:1042): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.58:22-10.0.0.1:51020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:38.898000 audit[3221]: USER_ACCT pid=3221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:38.900447 sshd[3221]: Accepted publickey for core from 10.0.0.1 port 51020 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:38.904689 kernel: audit: type=1101 audit(1747305638.898:1043): pid=3221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:38.903000 audit[3221]: CRED_ACQ pid=3221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:38.905352 sshd[3221]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:38.912016 kernel: audit: type=1103 audit(1747305638.903:1044): pid=3221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:38.912115 kernel: audit: type=1006 audit(1747305638.903:1045): pid=3221 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 15 10:40:38.912149 kernel: audit: type=1300 audit(1747305638.903:1045): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd9379270 a2=3 a3=0 items=0 ppid=1 pid=3221 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:38.903000 audit[3221]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd9379270 a2=3 a3=0 items=0 ppid=1 pid=3221 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:38.916673 kernel: audit: type=1327 audit(1747305638.903:1045): proctitle=737368643A20636F7265205B707269765D May 15 10:40:38.903000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:38.922260 systemd-logind[1195]: New session 14 of user core. May 15 10:40:38.923240 systemd[1]: Started session-14.scope. May 15 10:40:38.926000 audit[3221]: USER_START pid=3221 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:38.927000 audit[3223]: CRED_ACQ pid=3223 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:38.937821 kernel: audit: type=1105 audit(1747305638.926:1046): pid=3221 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:38.937883 kernel: audit: type=1103 audit(1747305638.927:1047): pid=3223 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:39.031860 env[1205]: time="2025-05-15T10:40:39.031577261Z" level=info msg="StopPodSandbox for \"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\"" May 15 10:40:39.056406 sshd[3221]: pam_unix(sshd:session): session closed for user core May 15 10:40:39.055000 audit[3221]: USER_END pid=3221 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:39.058847 systemd[1]: sshd@13-10.0.0.58:22-10.0.0.1:51020.service: Deactivated successfully. May 15 10:40:39.059642 systemd[1]: session-14.scope: Deactivated successfully. May 15 10:40:39.062010 systemd-logind[1195]: Session 14 logged out. Waiting for processes to exit. May 15 10:40:39.055000 audit[3221]: CRED_DISP pid=3221 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:39.063091 systemd-logind[1195]: Removed session 14. May 15 10:40:39.065636 kernel: audit: type=1106 audit(1747305639.055:1048): pid=3221 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:39.065705 kernel: audit: type=1104 audit(1747305639.055:1049): pid=3221 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:39.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.58:22-10.0.0.1:51020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:39.075687 env[1205]: time="2025-05-15T10:40:39.075579028Z" level=error msg="StopPodSandbox for \"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\" failed" error="failed to destroy network for sandbox \"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:39.075960 kubelet[2060]: E0515 10:40:39.075897 2060 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98" May 15 10:40:39.076294 kubelet[2060]: E0515 10:40:39.075976 2060 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98"} May 15 10:40:39.076294 kubelet[2060]: E0515 10:40:39.076021 2060 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"372820ce-5c22-42ae-a0c2-10ca7c493652\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:40:39.076294 kubelet[2060]: E0515 10:40:39.076059 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"372820ce-5c22-42ae-a0c2-10ca7c493652\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-85fd7b7cb7-vgq28" podUID="372820ce-5c22-42ae-a0c2-10ca7c493652" May 15 10:40:39.929820 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1526087387.mount: Deactivated successfully. May 15 10:40:40.030434 env[1205]: time="2025-05-15T10:40:40.030368708Z" level=info msg="StopPodSandbox for \"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\"" May 15 10:40:40.053105 env[1205]: time="2025-05-15T10:40:40.053039076Z" level=error msg="StopPodSandbox for \"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\" failed" error="failed to destroy network for sandbox \"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:40.053427 kubelet[2060]: E0515 10:40:40.053314 2060 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761" May 15 10:40:40.053427 kubelet[2060]: E0515 10:40:40.053377 2060 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761"} May 15 10:40:40.053427 kubelet[2060]: E0515 10:40:40.053414 2060 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:40:40.053577 kubelet[2060]: E0515 10:40:40.053437 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-tbr5q" podUID="d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d" May 15 10:40:41.030711 env[1205]: time="2025-05-15T10:40:41.030642270Z" level=info msg="StopPodSandbox for \"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\"" May 15 10:40:41.257302 env[1205]: time="2025-05-15T10:40:41.257227755Z" level=error msg="StopPodSandbox for \"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\" failed" error="failed to destroy network for sandbox \"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:41.257633 kubelet[2060]: E0515 10:40:41.257523 2060 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a" May 15 10:40:41.257633 kubelet[2060]: E0515 10:40:41.257581 2060 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a"} May 15 10:40:41.257633 kubelet[2060]: E0515 10:40:41.257614 2060 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fcb83224-37f0-4883-9e08-98a8f6194cef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:40:41.257893 kubelet[2060]: E0515 10:40:41.257636 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fcb83224-37f0-4883-9e08-98a8f6194cef\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-85fd7b7cb7-h2mp7" podUID="fcb83224-37f0-4883-9e08-98a8f6194cef" May 15 10:40:41.454980 env[1205]: time="2025-05-15T10:40:41.454900831Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:41.536348 env[1205]: time="2025-05-15T10:40:41.536298182Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:41.557800 env[1205]: time="2025-05-15T10:40:41.557754612Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:41.568368 env[1205]: time="2025-05-15T10:40:41.568329163Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:41.568863 env[1205]: time="2025-05-15T10:40:41.568833029Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 10:40:41.580741 env[1205]: time="2025-05-15T10:40:41.580703000Z" level=info msg="CreateContainer within sandbox \"d88a8af98c4266ef79679804acb4538fd38ba46a69772ac83b9e867653957424\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 10:40:42.030801 env[1205]: time="2025-05-15T10:40:42.030759777Z" level=info msg="StopPodSandbox for \"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\"" May 15 10:40:42.042875 env[1205]: time="2025-05-15T10:40:42.042801260Z" level=info msg="CreateContainer within sandbox \"d88a8af98c4266ef79679804acb4538fd38ba46a69772ac83b9e867653957424\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"80afa50cbd564788196b19bf14ac50cb92cef8b58e79242fee6a090294d5eca6\"" May 15 10:40:42.043393 env[1205]: time="2025-05-15T10:40:42.043363915Z" level=info msg="StartContainer for \"80afa50cbd564788196b19bf14ac50cb92cef8b58e79242fee6a090294d5eca6\"" May 15 10:40:42.057100 env[1205]: time="2025-05-15T10:40:42.057055405Z" level=error msg="StopPodSandbox for \"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\" failed" error="failed to destroy network for sandbox \"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:40:42.057358 kubelet[2060]: E0515 10:40:42.057296 2060 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4" May 15 10:40:42.057446 kubelet[2060]: E0515 10:40:42.057379 2060 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4"} May 15 10:40:42.057446 kubelet[2060]: E0515 10:40:42.057415 2060 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"832e5ea9-1687-4404-aa5d-bd6cc85411ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:40:42.057446 kubelet[2060]: E0515 10:40:42.057436 2060 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"832e5ea9-1687-4404-aa5d-bd6cc85411ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6mxq2" podUID="832e5ea9-1687-4404-aa5d-bd6cc85411ec" May 15 10:40:42.059202 systemd[1]: Started cri-containerd-80afa50cbd564788196b19bf14ac50cb92cef8b58e79242fee6a090294d5eca6.scope. May 15 10:40:42.078000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f29d0300aa8 items=0 ppid=2520 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:42.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830616661353063626435363437383831393662313962663134616335 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit: BPF prog-id=136 op=LOAD May 15 10:40:42.078000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d7ba8 items=0 ppid=2520 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:42.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830616661353063626435363437383831393662313962663134616335 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit: BPF prog-id=137 op=LOAD May 15 10:40:42.078000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d7bf8 items=0 ppid=2520 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:42.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830616661353063626435363437383831393662313962663134616335 May 15 10:40:42.078000 audit: BPF prog-id=137 op=UNLOAD May 15 10:40:42.078000 audit: BPF prog-id=136 op=UNLOAD May 15 10:40:42.078000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { perfmon } for pid=3337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit[3337]: AVC avc: denied { bpf } for pid=3337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:42.078000 audit: BPF prog-id=138 op=LOAD May 15 10:40:42.078000 audit[3337]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d7c88 items=0 ppid=2520 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:42.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830616661353063626435363437383831393662313962663134616335 May 15 10:40:42.196575 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 10:40:42.196724 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 10:40:42.221891 env[1205]: time="2025-05-15T10:40:42.221819645Z" level=info msg="StartContainer for \"80afa50cbd564788196b19bf14ac50cb92cef8b58e79242fee6a090294d5eca6\" returns successfully" May 15 10:40:42.371230 kubelet[2060]: E0515 10:40:42.371110 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:42.563854 kubelet[2060]: I0515 10:40:42.563792 2060 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-fxdwx" podStartSLOduration=1.660249904 podStartE2EDuration="32.56377362s" podCreationTimestamp="2025-05-15 10:40:10 +0000 UTC" firstStartedPulling="2025-05-15 10:40:10.666035906 +0000 UTC m=+20.737258089" lastFinishedPulling="2025-05-15 10:40:41.569559622 +0000 UTC m=+51.640781805" observedRunningTime="2025-05-15 10:40:42.561755242 +0000 UTC m=+52.632977415" watchObservedRunningTime="2025-05-15 10:40:42.56377362 +0000 UTC m=+52.634995803" May 15 10:40:43.030298 env[1205]: time="2025-05-15T10:40:43.030246819Z" level=info msg="StopPodSandbox for \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\"" May 15 10:40:43.030928 env[1205]: time="2025-05-15T10:40:43.030878852Z" level=info msg="StopPodSandbox for \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\"" May 15 10:40:43.129128 env[1205]: 2025-05-15 10:40:43.077 [INFO][3450] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" May 15 10:40:43.129128 env[1205]: 2025-05-15 10:40:43.077 [INFO][3450] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" iface="eth0" netns="/var/run/netns/cni-818e1a31-238a-6b76-765d-32b9bf947b2c" May 15 10:40:43.129128 env[1205]: 2025-05-15 10:40:43.077 [INFO][3450] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" iface="eth0" netns="/var/run/netns/cni-818e1a31-238a-6b76-765d-32b9bf947b2c" May 15 10:40:43.129128 env[1205]: 2025-05-15 10:40:43.077 [INFO][3450] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" iface="eth0" netns="/var/run/netns/cni-818e1a31-238a-6b76-765d-32b9bf947b2c" May 15 10:40:43.129128 env[1205]: 2025-05-15 10:40:43.078 [INFO][3450] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" May 15 10:40:43.129128 env[1205]: 2025-05-15 10:40:43.078 [INFO][3450] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" May 15 10:40:43.129128 env[1205]: 2025-05-15 10:40:43.118 [INFO][3468] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" HandleID="k8s-pod-network.58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" Workload="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" May 15 10:40:43.129128 env[1205]: 2025-05-15 10:40:43.118 [INFO][3468] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:43.129128 env[1205]: 2025-05-15 10:40:43.118 [INFO][3468] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:43.129128 env[1205]: 2025-05-15 10:40:43.125 [WARNING][3468] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" HandleID="k8s-pod-network.58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" Workload="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" May 15 10:40:43.129128 env[1205]: 2025-05-15 10:40:43.125 [INFO][3468] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" HandleID="k8s-pod-network.58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" Workload="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" May 15 10:40:43.129128 env[1205]: 2025-05-15 10:40:43.126 [INFO][3468] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:43.129128 env[1205]: 2025-05-15 10:40:43.127 [INFO][3450] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" May 15 10:40:43.132020 systemd[1]: run-netns-cni\x2d818e1a31\x2d238a\x2d6b76\x2d765d\x2d32b9bf947b2c.mount: Deactivated successfully. May 15 10:40:43.132898 env[1205]: time="2025-05-15T10:40:43.132852396Z" level=info msg="TearDown network for sandbox \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\" successfully" May 15 10:40:43.133028 env[1205]: time="2025-05-15T10:40:43.132988537Z" level=info msg="StopPodSandbox for \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\" returns successfully" May 15 10:40:43.133894 env[1205]: time="2025-05-15T10:40:43.133848155Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78ddbbc6d7-fq45l,Uid:6f53a062-ebf2-46b9-8b99-8fafa7e0b001,Namespace:calico-system,Attempt:1,}" May 15 10:40:43.137343 env[1205]: 2025-05-15 10:40:43.076 [INFO][3451] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" May 15 10:40:43.137343 env[1205]: 2025-05-15 10:40:43.077 [INFO][3451] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" iface="eth0" netns="/var/run/netns/cni-604c2cdf-eed5-f319-8e8e-cbbee0f29412" May 15 10:40:43.137343 env[1205]: 2025-05-15 10:40:43.077 [INFO][3451] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" iface="eth0" netns="/var/run/netns/cni-604c2cdf-eed5-f319-8e8e-cbbee0f29412" May 15 10:40:43.137343 env[1205]: 2025-05-15 10:40:43.077 [INFO][3451] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" iface="eth0" netns="/var/run/netns/cni-604c2cdf-eed5-f319-8e8e-cbbee0f29412" May 15 10:40:43.137343 env[1205]: 2025-05-15 10:40:43.078 [INFO][3451] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" May 15 10:40:43.137343 env[1205]: 2025-05-15 10:40:43.078 [INFO][3451] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" May 15 10:40:43.137343 env[1205]: 2025-05-15 10:40:43.117 [INFO][3466] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" HandleID="k8s-pod-network.7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" Workload="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" May 15 10:40:43.137343 env[1205]: 2025-05-15 10:40:43.117 [INFO][3466] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:43.137343 env[1205]: 2025-05-15 10:40:43.126 [INFO][3466] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:43.137343 env[1205]: 2025-05-15 10:40:43.132 [WARNING][3466] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" HandleID="k8s-pod-network.7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" Workload="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" May 15 10:40:43.137343 env[1205]: 2025-05-15 10:40:43.132 [INFO][3466] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" HandleID="k8s-pod-network.7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" Workload="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" May 15 10:40:43.137343 env[1205]: 2025-05-15 10:40:43.133 [INFO][3466] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:43.137343 env[1205]: 2025-05-15 10:40:43.135 [INFO][3451] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" May 15 10:40:43.137828 env[1205]: time="2025-05-15T10:40:43.137464279Z" level=info msg="TearDown network for sandbox \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\" successfully" May 15 10:40:43.137828 env[1205]: time="2025-05-15T10:40:43.137484979Z" level=info msg="StopPodSandbox for \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\" returns successfully" May 15 10:40:43.138542 kubelet[2060]: E0515 10:40:43.138088 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:43.139302 env[1205]: time="2025-05-15T10:40:43.139273869Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-jhsth,Uid:a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0,Namespace:kube-system,Attempt:1,}" May 15 10:40:43.143322 systemd[1]: run-netns-cni\x2d604c2cdf\x2deed5\x2df319\x2d8e8e\x2dcbbee0f29412.mount: Deactivated successfully. May 15 10:40:43.276955 systemd-networkd[1024]: cali26a4dad8454: Link UP May 15 10:40:43.278410 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:40:43.278452 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali26a4dad8454: link becomes ready May 15 10:40:43.278512 systemd-networkd[1024]: cali26a4dad8454: Gained carrier May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.180 [INFO][3481] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.190 [INFO][3481] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0 calico-kube-controllers-78ddbbc6d7- calico-system 6f53a062-ebf2-46b9-8b99-8fafa7e0b001 894 0 2025-05-15 10:40:10 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:78ddbbc6d7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-78ddbbc6d7-fq45l eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali26a4dad8454 [] []}} ContainerID="42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" Namespace="calico-system" Pod="calico-kube-controllers-78ddbbc6d7-fq45l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-" May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.191 [INFO][3481] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" Namespace="calico-system" Pod="calico-kube-controllers-78ddbbc6d7-fq45l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.231 [INFO][3510] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" HandleID="k8s-pod-network.42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" Workload="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.242 [INFO][3510] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" HandleID="k8s-pod-network.42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" Workload="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c6ec0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-78ddbbc6d7-fq45l", "timestamp":"2025-05-15 10:40:43.231946228 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.243 [INFO][3510] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.243 [INFO][3510] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.243 [INFO][3510] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.244 [INFO][3510] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" host="localhost" May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.247 [INFO][3510] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.250 [INFO][3510] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.251 [INFO][3510] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.255 [INFO][3510] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.255 [INFO][3510] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" host="localhost" May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.258 [INFO][3510] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5 May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.261 [INFO][3510] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" host="localhost" May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.265 [INFO][3510] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" host="localhost" May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.265 [INFO][3510] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" host="localhost" May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.265 [INFO][3510] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:43.301836 env[1205]: 2025-05-15 10:40:43.265 [INFO][3510] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" HandleID="k8s-pod-network.42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" Workload="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" May 15 10:40:43.302426 env[1205]: 2025-05-15 10:40:43.267 [INFO][3481] cni-plugin/k8s.go 386: Populated endpoint ContainerID="42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" Namespace="calico-system" Pod="calico-kube-controllers-78ddbbc6d7-fq45l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0", GenerateName:"calico-kube-controllers-78ddbbc6d7-", Namespace:"calico-system", SelfLink:"", UID:"6f53a062-ebf2-46b9-8b99-8fafa7e0b001", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78ddbbc6d7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-78ddbbc6d7-fq45l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali26a4dad8454", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:43.302426 env[1205]: 2025-05-15 10:40:43.267 [INFO][3481] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" Namespace="calico-system" Pod="calico-kube-controllers-78ddbbc6d7-fq45l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" May 15 10:40:43.302426 env[1205]: 2025-05-15 10:40:43.267 [INFO][3481] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali26a4dad8454 ContainerID="42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" Namespace="calico-system" Pod="calico-kube-controllers-78ddbbc6d7-fq45l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" May 15 10:40:43.302426 env[1205]: 2025-05-15 10:40:43.278 [INFO][3481] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" Namespace="calico-system" Pod="calico-kube-controllers-78ddbbc6d7-fq45l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" May 15 10:40:43.302426 env[1205]: 2025-05-15 10:40:43.279 [INFO][3481] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" Namespace="calico-system" Pod="calico-kube-controllers-78ddbbc6d7-fq45l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0", GenerateName:"calico-kube-controllers-78ddbbc6d7-", Namespace:"calico-system", SelfLink:"", UID:"6f53a062-ebf2-46b9-8b99-8fafa7e0b001", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78ddbbc6d7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5", Pod:"calico-kube-controllers-78ddbbc6d7-fq45l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali26a4dad8454", MAC:"f2:a2:6b:88:95:03", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:43.302426 env[1205]: 2025-05-15 10:40:43.298 [INFO][3481] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5" Namespace="calico-system" Pod="calico-kube-controllers-78ddbbc6d7-fq45l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" May 15 10:40:43.343642 env[1205]: time="2025-05-15T10:40:43.343488009Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:40:43.343642 env[1205]: time="2025-05-15T10:40:43.343519831Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:40:43.343642 env[1205]: time="2025-05-15T10:40:43.343528758Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:40:43.343835 env[1205]: time="2025-05-15T10:40:43.343681340Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5 pid=3548 runtime=io.containerd.runc.v2 May 15 10:40:43.344992 systemd-networkd[1024]: calib0f7ebf8079: Link UP May 15 10:40:43.346686 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib0f7ebf8079: link becomes ready May 15 10:40:43.346674 systemd-networkd[1024]: calib0f7ebf8079: Gained carrier May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.191 [INFO][3494] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.203 [INFO][3494] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0 coredns-7db6d8ff4d- kube-system a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0 893 0 2025-05-15 10:40:04 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-jhsth eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib0f7ebf8079 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jhsth" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--jhsth-" May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.203 [INFO][3494] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jhsth" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.261 [INFO][3519] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" HandleID="k8s-pod-network.11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" Workload="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.273 [INFO][3519] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" HandleID="k8s-pod-network.11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" Workload="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001fc1f0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-jhsth", "timestamp":"2025-05-15 10:40:43.26142796 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.273 [INFO][3519] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.273 [INFO][3519] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.273 [INFO][3519] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.277 [INFO][3519] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" host="localhost" May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.292 [INFO][3519] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.303 [INFO][3519] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.305 [INFO][3519] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.307 [INFO][3519] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.307 [INFO][3519] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" host="localhost" May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.311 [INFO][3519] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.319 [INFO][3519] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" host="localhost" May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.335 [INFO][3519] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" host="localhost" May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.336 [INFO][3519] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" host="localhost" May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.336 [INFO][3519] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:43.357228 env[1205]: 2025-05-15 10:40:43.336 [INFO][3519] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" HandleID="k8s-pod-network.11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" Workload="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" May 15 10:40:43.357943 env[1205]: 2025-05-15 10:40:43.337 [INFO][3494] cni-plugin/k8s.go 386: Populated endpoint ContainerID="11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jhsth" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-jhsth", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib0f7ebf8079", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:43.357943 env[1205]: 2025-05-15 10:40:43.337 [INFO][3494] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jhsth" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" May 15 10:40:43.357943 env[1205]: 2025-05-15 10:40:43.337 [INFO][3494] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib0f7ebf8079 ContainerID="11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jhsth" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" May 15 10:40:43.357943 env[1205]: 2025-05-15 10:40:43.347 [INFO][3494] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jhsth" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" May 15 10:40:43.357943 env[1205]: 2025-05-15 10:40:43.347 [INFO][3494] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jhsth" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b", Pod:"coredns-7db6d8ff4d-jhsth", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib0f7ebf8079", MAC:"12:24:9d:36:36:2e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:43.357943 env[1205]: 2025-05-15 10:40:43.355 [INFO][3494] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jhsth" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" May 15 10:40:43.360552 systemd[1]: Started cri-containerd-42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5.scope. May 15 10:40:43.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.370000 audit: BPF prog-id=139 op=LOAD May 15 10:40:43.373094 kubelet[2060]: E0515 10:40:43.373055 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:43.371000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3548 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:43.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633664656433333265323037383831633962343033666235616139 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3548 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:43.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633664656433333265323037383831633962343033666235616139 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit: BPF prog-id=140 op=LOAD May 15 10:40:43.371000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028f280 items=0 ppid=3548 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:43.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633664656433333265323037383831633962343033666235616139 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit: BPF prog-id=141 op=LOAD May 15 10:40:43.371000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028f2c8 items=0 ppid=3548 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:43.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633664656433333265323037383831633962343033666235616139 May 15 10:40:43.371000 audit: BPF prog-id=141 op=UNLOAD May 15 10:40:43.371000 audit: BPF prog-id=140 op=UNLOAD May 15 10:40:43.371000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.371000 audit: BPF prog-id=142 op=LOAD May 15 10:40:43.371000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028f6d8 items=0 ppid=3548 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:43.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633664656433333265323037383831633962343033666235616139 May 15 10:40:43.375110 env[1205]: time="2025-05-15T10:40:43.373808690Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:40:43.375110 env[1205]: time="2025-05-15T10:40:43.373838357Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:40:43.375110 env[1205]: time="2025-05-15T10:40:43.373847033Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:40:43.375110 env[1205]: time="2025-05-15T10:40:43.373945031Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b pid=3592 runtime=io.containerd.runc.v2 May 15 10:40:43.375612 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:40:43.385728 systemd[1]: Started cri-containerd-11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b.scope. May 15 10:40:43.401372 env[1205]: time="2025-05-15T10:40:43.401332276Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78ddbbc6d7-fq45l,Uid:6f53a062-ebf2-46b9-8b99-8fafa7e0b001,Namespace:calico-system,Attempt:1,} returns sandbox id \"42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5\"" May 15 10:40:43.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit: BPF prog-id=143 op=LOAD May 15 10:40:43.401000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3592 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:43.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131613364363839366237346364336232633037666632393730623566 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3592 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:43.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131613364363839366237346364336232633037666632393730623566 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit: BPF prog-id=144 op=LOAD May 15 10:40:43.401000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003f6710 items=0 ppid=3592 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:43.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131613364363839366237346364336232633037666632393730623566 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.401000 audit: BPF prog-id=145 op=LOAD May 15 10:40:43.401000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003f6758 items=0 ppid=3592 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:43.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131613364363839366237346364336232633037666632393730623566 May 15 10:40:43.401000 audit: BPF prog-id=145 op=UNLOAD May 15 10:40:43.401000 audit: BPF prog-id=144 op=UNLOAD May 15 10:40:43.402000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.402000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.402000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.402000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.402000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.402000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.402000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.402000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.402000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.402000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.402000 audit: BPF prog-id=146 op=LOAD May 15 10:40:43.402000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003f6b68 items=0 ppid=3592 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:43.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131613364363839366237346364336232633037666632393730623566 May 15 10:40:43.404261 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:40:43.408960 env[1205]: time="2025-05-15T10:40:43.408925797Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 15 10:40:43.429218 env[1205]: time="2025-05-15T10:40:43.429176197Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-jhsth,Uid:a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0,Namespace:kube-system,Attempt:1,} returns sandbox id \"11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b\"" May 15 10:40:43.430478 kubelet[2060]: E0515 10:40:43.430452 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:43.432236 env[1205]: time="2025-05-15T10:40:43.432209003Z" level=info msg="CreateContainer within sandbox \"11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:40:43.498547 env[1205]: time="2025-05-15T10:40:43.498489566Z" level=info msg="CreateContainer within sandbox \"11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6bfeb85c90338e9a32b069f363700b6277e83f0b36a7b34a90486a5f23e96f4e\"" May 15 10:40:43.499048 env[1205]: time="2025-05-15T10:40:43.499016526Z" level=info msg="StartContainer for \"6bfeb85c90338e9a32b069f363700b6277e83f0b36a7b34a90486a5f23e96f4e\"" May 15 10:40:43.511459 systemd[1]: Started cri-containerd-6bfeb85c90338e9a32b069f363700b6277e83f0b36a7b34a90486a5f23e96f4e.scope. May 15 10:40:43.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit: BPF prog-id=147 op=LOAD May 15 10:40:43.520000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3592 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:43.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666562383563393033333865396133326230363966333633373030 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3592 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:43.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666562383563393033333865396133326230363966333633373030 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit: BPF prog-id=148 op=LOAD May 15 10:40:43.520000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000332cc0 items=0 ppid=3592 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:43.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666562383563393033333865396133326230363966333633373030 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit: BPF prog-id=149 op=LOAD May 15 10:40:43.520000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000332d08 items=0 ppid=3592 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:43.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666562383563393033333865396133326230363966333633373030 May 15 10:40:43.520000 audit: BPF prog-id=149 op=UNLOAD May 15 10:40:43.520000 audit: BPF prog-id=148 op=UNLOAD May 15 10:40:43.520000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:43.520000 audit: BPF prog-id=150 op=LOAD May 15 10:40:43.520000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000333118 items=0 ppid=3592 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:43.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666562383563393033333865396133326230363966333633373030 May 15 10:40:43.533820 env[1205]: time="2025-05-15T10:40:43.533780486Z" level=info msg="StartContainer for \"6bfeb85c90338e9a32b069f363700b6277e83f0b36a7b34a90486a5f23e96f4e\" returns successfully" May 15 10:40:44.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.58:22-10.0.0.1:39636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:44.058942 systemd[1]: Started sshd@14-10.0.0.58:22-10.0.0.1:39636.service. May 15 10:40:44.063324 kernel: kauditd_printk_skb: 215 callbacks suppressed May 15 10:40:44.063380 kernel: audit: type=1130 audit(1747305644.057:1111): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.58:22-10.0.0.1:39636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:44.059000 audit[3756]: AVC avc: denied { write } for pid=3756 comm="tee" name="fd" dev="proc" ino=27027 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:40:44.071689 kernel: audit: type=1400 audit(1747305644.059:1112): avc: denied { write } for pid=3756 comm="tee" name="fd" dev="proc" ino=27027 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:40:44.071738 kernel: audit: type=1300 audit(1747305644.059:1112): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe22417a2a a2=241 a3=1b6 items=1 ppid=3704 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.059000 audit[3756]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe22417a2a a2=241 a3=1b6 items=1 ppid=3704 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.059000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 10:40:44.077093 kernel: audit: type=1307 audit(1747305644.059:1112): cwd="/etc/service/enabled/bird6/log" May 15 10:40:44.077128 kernel: audit: type=1302 audit(1747305644.059:1112): item=0 name="/dev/fd/63" inode=25150 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:40:44.059000 audit: PATH item=0 name="/dev/fd/63" inode=25150 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:40:44.080432 kernel: audit: type=1327 audit(1747305644.059:1112): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:40:44.059000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:40:44.076000 audit[3764]: AVC avc: denied { write } for pid=3764 comm="tee" name="fd" dev="proc" ino=24532 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:40:44.085691 kernel: audit: type=1400 audit(1747305644.076:1113): avc: denied { write } for pid=3764 comm="tee" name="fd" dev="proc" ino=24532 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:40:44.076000 audit[3764]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa7482a1b a2=241 a3=1b6 items=1 ppid=3711 pid=3764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.090681 kernel: audit: type=1300 audit(1747305644.076:1113): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa7482a1b a2=241 a3=1b6 items=1 ppid=3711 pid=3764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.076000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 10:40:44.092705 kernel: audit: type=1307 audit(1747305644.076:1113): cwd="/etc/service/enabled/node-status-reporter/log" May 15 10:40:44.076000 audit: PATH item=0 name="/dev/fd/63" inode=25155 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:40:44.096679 kernel: audit: type=1302 audit(1747305644.076:1113): item=0 name="/dev/fd/63" inode=25155 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:40:44.076000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:40:44.084000 audit[3737]: AVC avc: denied { write } for pid=3737 comm="tee" name="fd" dev="proc" ino=25160 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:40:44.084000 audit[3737]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffbef6ea2c a2=241 a3=1b6 items=1 ppid=3705 pid=3737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.084000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 10:40:44.084000 audit: PATH item=0 name="/dev/fd/63" inode=26177 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:40:44.084000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:40:44.091000 audit[3758]: AVC avc: denied { write } for pid=3758 comm="tee" name="fd" dev="proc" ino=27039 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:40:44.091000 audit[3758]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa3283a2a a2=241 a3=1b6 items=1 ppid=3716 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.091000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 10:40:44.091000 audit: PATH item=0 name="/dev/fd/63" inode=27031 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:40:44.091000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:40:44.098000 audit[3784]: AVC avc: denied { write } for pid=3784 comm="tee" name="fd" dev="proc" ino=25166 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:40:44.098000 audit[3784]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf3ad3a1a a2=241 a3=1b6 items=1 ppid=3706 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.098000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 10:40:44.098000 audit: PATH item=0 name="/dev/fd/63" inode=24543 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:40:44.098000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:40:44.100000 audit[3782]: AVC avc: denied { write } for pid=3782 comm="tee" name="fd" dev="proc" ino=25173 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:40:44.100000 audit[3782]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd613efa2a a2=241 a3=1b6 items=1 ppid=3715 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.100000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 10:40:44.100000 audit: PATH item=0 name="/dev/fd/63" inode=27042 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:40:44.100000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:40:44.107000 audit[3786]: AVC avc: denied { write } for pid=3786 comm="tee" name="fd" dev="proc" ino=25177 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:40:44.107000 audit[3786]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcda248a2b a2=241 a3=1b6 items=1 ppid=3703 pid=3786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.107000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 10:40:44.107000 audit: PATH item=0 name="/dev/fd/63" inode=25170 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:40:44.107000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:40:44.191000 audit[3755]: USER_ACCT pid=3755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:44.193342 sshd[3755]: Accepted publickey for core from 10.0.0.1 port 39636 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:44.192000 audit[3755]: CRED_ACQ pid=3755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:44.192000 audit[3755]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefd350c50 a2=3 a3=0 items=0 ppid=1 pid=3755 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.192000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:44.194511 sshd[3755]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:44.198882 systemd[1]: Started session-15.scope. May 15 10:40:44.197000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.197000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.197000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.197000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.197000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.197000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.197000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.197000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.197000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.197000 audit: BPF prog-id=151 op=LOAD May 15 10:40:44.197000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb3252af0 a2=98 a3=3 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.197000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.197000 audit: BPF prog-id=151 op=UNLOAD May 15 10:40:44.198000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit: BPF prog-id=152 op=LOAD May 15 10:40:44.198000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb32528d0 a2=74 a3=540051 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.198000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.198000 audit: BPF prog-id=152 op=UNLOAD May 15 10:40:44.198000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.198000 audit: BPF prog-id=153 op=LOAD May 15 10:40:44.198000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb3252900 a2=94 a3=2 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.198000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.198000 audit: BPF prog-id=153 op=UNLOAD May 15 10:40:44.199595 systemd-logind[1195]: New session 15 of user core. May 15 10:40:44.207000 audit[3755]: USER_START pid=3755 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:44.209000 audit[3827]: CRED_ACQ pid=3827 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:44.311000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.311000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.311000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.311000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.311000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.311000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.311000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.311000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.311000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.311000 audit: BPF prog-id=154 op=LOAD May 15 10:40:44.311000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb32527c0 a2=40 a3=1 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.311000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.311000 audit: BPF prog-id=154 op=UNLOAD May 15 10:40:44.311000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.311000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdb3252890 a2=50 a3=7ffdb3252970 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.311000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.318000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.318000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb32527d0 a2=28 a3=0 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.318000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.318000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.318000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb3252800 a2=28 a3=0 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.318000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.318000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.318000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb3252710 a2=28 a3=0 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.318000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.318000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.318000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb3252820 a2=28 a3=0 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.318000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.318000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.318000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb3252800 a2=28 a3=0 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.318000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.318000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.318000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb32527f0 a2=28 a3=0 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.318000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.318000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.318000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb3252820 a2=28 a3=0 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.318000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.318000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.318000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb3252800 a2=28 a3=0 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.318000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.318000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.318000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb3252820 a2=28 a3=0 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.318000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.318000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.318000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb32527f0 a2=28 a3=0 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.318000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.318000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.318000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb3252860 a2=28 a3=0 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.318000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdb3252610 a2=50 a3=1 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.319000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit: BPF prog-id=155 op=LOAD May 15 10:40:44.319000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdb3252610 a2=94 a3=5 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.319000 audit: BPF prog-id=155 op=UNLOAD May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdb32526c0 a2=50 a3=1 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.319000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdb32527e0 a2=4 a3=38 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.319000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { confidentiality } for pid=3826 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:44.319000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb3252830 a2=94 a3=6 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.319000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { confidentiality } for pid=3826 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:44.319000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb3251fe0 a2=94 a3=83 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.319000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.319000 audit[3826]: AVC avc: denied { confidentiality } for pid=3826 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:44.319000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb3251fe0 a2=94 a3=83 items=0 ppid=3717 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:40:44.327510 sshd[3755]: pam_unix(sshd:session): session closed for user core May 15 10:40:44.326000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit: BPF prog-id=156 op=LOAD May 15 10:40:44.326000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd3fc2220 a2=98 a3=1999999999999999 items=0 ppid=3717 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.326000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:40:44.326000 audit: BPF prog-id=156 op=UNLOAD May 15 10:40:44.326000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit: BPF prog-id=157 op=LOAD May 15 10:40:44.326000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd3fc2100 a2=74 a3=ffff items=0 ppid=3717 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.326000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:40:44.326000 audit: BPF prog-id=157 op=UNLOAD May 15 10:40:44.326000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.326000 audit: BPF prog-id=158 op=LOAD May 15 10:40:44.326000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd3fc2140 a2=40 a3=7fffd3fc2320 items=0 ppid=3717 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.326000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:40:44.326000 audit: BPF prog-id=158 op=UNLOAD May 15 10:40:44.327000 audit[3755]: USER_END pid=3755 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:44.327000 audit[3755]: CRED_DISP pid=3755 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:44.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.58:22-10.0.0.1:39636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:44.330310 systemd[1]: sshd@14-10.0.0.58:22-10.0.0.1:39636.service: Deactivated successfully. May 15 10:40:44.331094 systemd[1]: session-15.scope: Deactivated successfully. May 15 10:40:44.331945 systemd-logind[1195]: Session 15 logged out. Waiting for processes to exit. May 15 10:40:44.332677 systemd-logind[1195]: Removed session 15. May 15 10:40:44.370360 systemd-networkd[1024]: vxlan.calico: Link UP May 15 10:40:44.370368 systemd-networkd[1024]: vxlan.calico: Gained carrier May 15 10:40:44.377833 kubelet[2060]: E0515 10:40:44.377799 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:44.390000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.390000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.390000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.390000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.390000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.390000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.390000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.390000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.390000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.390000 audit: BPF prog-id=159 op=LOAD May 15 10:40:44.390000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc1baba9b0 a2=98 a3=ffffffff items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.390000 audit: BPF prog-id=159 op=UNLOAD May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit: BPF prog-id=160 op=LOAD May 15 10:40:44.391000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc1baba7c0 a2=74 a3=540051 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.391000 audit: BPF prog-id=160 op=UNLOAD May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit: BPF prog-id=161 op=LOAD May 15 10:40:44.391000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc1baba7f0 a2=94 a3=2 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.391000 audit: BPF prog-id=161 op=UNLOAD May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc1baba6c0 a2=28 a3=0 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc1baba6f0 a2=28 a3=0 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc1baba600 a2=28 a3=0 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc1baba710 a2=28 a3=0 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc1baba6f0 a2=28 a3=0 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc1baba6e0 a2=28 a3=0 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc1baba710 a2=28 a3=0 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc1baba6f0 a2=28 a3=0 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc1baba710 a2=28 a3=0 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc1baba6e0 a2=28 a3=0 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc1baba750 a2=28 a3=0 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit: BPF prog-id=162 op=LOAD May 15 10:40:44.391000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc1baba5c0 a2=40 a3=0 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.391000 audit: BPF prog-id=162 op=UNLOAD May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc1baba5b0 a2=50 a3=2800 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc1baba5b0 a2=50 a3=2800 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.391000 audit: BPF prog-id=163 op=LOAD May 15 10:40:44.391000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc1bab9dd0 a2=94 a3=2 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.392000 audit: BPF prog-id=163 op=UNLOAD May 15 10:40:44.392000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.392000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.392000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.392000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.392000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.392000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.392000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.392000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.392000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.392000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.392000 audit: BPF prog-id=164 op=LOAD May 15 10:40:44.392000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc1bab9ed0 a2=94 a3=30 items=0 ppid=3717 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.392000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:40:44.403000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.403000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.403000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.403000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.403000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.403000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.403000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.403000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.403000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.403000 audit: BPF prog-id=165 op=LOAD May 15 10:40:44.403000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff1b1c7ab0 a2=98 a3=0 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.403000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.404000 audit: BPF prog-id=165 op=UNLOAD May 15 10:40:44.405000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit: BPF prog-id=166 op=LOAD May 15 10:40:44.405000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1b1c7890 a2=74 a3=540051 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.405000 audit: BPF prog-id=166 op=UNLOAD May 15 10:40:44.405000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.405000 audit: BPF prog-id=167 op=LOAD May 15 10:40:44.405000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1b1c78c0 a2=94 a3=2 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.406000 audit: BPF prog-id=167 op=UNLOAD May 15 10:40:44.409000 audit[3877]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=3877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:44.409000 audit[3877]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdcec49280 a2=0 a3=7ffdcec4926c items=0 ppid=2219 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.409000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:44.416000 audit[3877]: NETFILTER_CFG table=nat:98 family=2 entries=14 op=nft_register_rule pid=3877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:44.416000 audit[3877]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffdcec49280 a2=0 a3=0 items=0 ppid=2219 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:44.419718 kubelet[2060]: I0515 10:40:44.419642 2060 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-jhsth" podStartSLOduration=40.419618386 podStartE2EDuration="40.419618386s" podCreationTimestamp="2025-05-15 10:40:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:40:44.39723941 +0000 UTC m=+54.468461593" watchObservedRunningTime="2025-05-15 10:40:44.419618386 +0000 UTC m=+54.490840569" May 15 10:40:44.431000 audit[3879]: NETFILTER_CFG table=filter:99 family=2 entries=13 op=nft_register_rule pid=3879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:44.431000 audit[3879]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc2c063060 a2=0 a3=7ffc2c06304c items=0 ppid=2219 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.431000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:44.440000 audit[3879]: NETFILTER_CFG table=nat:100 family=2 entries=35 op=nft_register_chain pid=3879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:44.440000 audit[3879]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc2c063060 a2=0 a3=7ffc2c06304c items=0 ppid=2219 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.440000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:44.514000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.514000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.514000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.514000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.514000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.514000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.514000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.514000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.514000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.514000 audit: BPF prog-id=168 op=LOAD May 15 10:40:44.514000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1b1c7780 a2=40 a3=1 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.514000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.515000 audit: BPF prog-id=168 op=UNLOAD May 15 10:40:44.515000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.515000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff1b1c7850 a2=50 a3=7fff1b1c7930 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.515000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1b1c7790 a2=28 a3=0 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1b1c77c0 a2=28 a3=0 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1b1c76d0 a2=28 a3=0 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1b1c77e0 a2=28 a3=0 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1b1c77c0 a2=28 a3=0 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1b1c77b0 a2=28 a3=0 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1b1c77e0 a2=28 a3=0 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1b1c77c0 a2=28 a3=0 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1b1c77e0 a2=28 a3=0 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1b1c77b0 a2=28 a3=0 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1b1c7820 a2=28 a3=0 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff1b1c75d0 a2=50 a3=1 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit: BPF prog-id=169 op=LOAD May 15 10:40:44.522000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff1b1c75d0 a2=94 a3=5 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.522000 audit: BPF prog-id=169 op=UNLOAD May 15 10:40:44.522000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff1b1c7680 a2=50 a3=1 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff1b1c77a0 a2=4 a3=38 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.522000 audit[3876]: AVC avc: denied { confidentiality } for pid=3876 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:44.522000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1b1c77f0 a2=94 a3=6 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { confidentiality } for pid=3876 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:44.523000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1b1c6fa0 a2=94 a3=83 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.523000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { confidentiality } for pid=3876 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:44.523000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1b1c6fa0 a2=94 a3=83 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.523000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff1b1c89e0 a2=10 a3=208 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.523000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff1b1c8880 a2=10 a3=3 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.523000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff1b1c8820 a2=10 a3=3 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.523000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.523000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:44.523000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff1b1c8820 a2=10 a3=7 items=0 ppid=3717 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.523000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:40:44.529000 audit: BPF prog-id=164 op=UNLOAD May 15 10:40:44.573000 audit[3904]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=3904 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:40:44.573000 audit[3904]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff26655c10 a2=0 a3=7fff26655bfc items=0 ppid=3717 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.573000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:40:44.577000 audit[3905]: NETFILTER_CFG table=nat:102 family=2 entries=15 op=nft_register_chain pid=3905 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:40:44.577000 audit[3905]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe1b2a3390 a2=0 a3=7ffe1b2a337c items=0 ppid=3717 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.577000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:40:44.583000 audit[3903]: NETFILTER_CFG table=raw:103 family=2 entries=21 op=nft_register_chain pid=3903 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:40:44.583000 audit[3903]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff425a1a60 a2=0 a3=7fff425a1a4c items=0 ppid=3717 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.583000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:40:44.590000 audit[3909]: NETFILTER_CFG table=filter:104 family=2 entries=99 op=nft_register_chain pid=3909 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:40:44.590000 audit[3909]: SYSCALL arch=c000003e syscall=46 success=yes exit=53840 a0=3 a1=7fff577be340 a2=0 a3=7fff577be32c items=0 ppid=3717 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:44.590000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:40:45.140815 systemd-networkd[1024]: cali26a4dad8454: Gained IPv6LL May 15 10:40:45.204811 systemd-networkd[1024]: calib0f7ebf8079: Gained IPv6LL May 15 10:40:45.382872 kubelet[2060]: E0515 10:40:45.382777 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:45.588852 systemd-networkd[1024]: vxlan.calico: Gained IPv6LL May 15 10:40:46.269256 env[1205]: time="2025-05-15T10:40:46.269199887Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:46.271518 env[1205]: time="2025-05-15T10:40:46.271486384Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:46.272973 env[1205]: time="2025-05-15T10:40:46.272947861Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:46.274281 env[1205]: time="2025-05-15T10:40:46.274244964Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:46.274778 env[1205]: time="2025-05-15T10:40:46.274747816Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 15 10:40:46.281908 env[1205]: time="2025-05-15T10:40:46.281851394Z" level=info msg="CreateContainer within sandbox \"42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 15 10:40:46.294747 env[1205]: time="2025-05-15T10:40:46.294710227Z" level=info msg="CreateContainer within sandbox \"42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"f9cafbc25d4b405914408c8ed74d2a0c63be8e0b99ea78acee0be0f1013d6f7a\"" May 15 10:40:46.295128 env[1205]: time="2025-05-15T10:40:46.295106425Z" level=info msg="StartContainer for \"f9cafbc25d4b405914408c8ed74d2a0c63be8e0b99ea78acee0be0f1013d6f7a\"" May 15 10:40:46.310113 systemd[1]: Started cri-containerd-f9cafbc25d4b405914408c8ed74d2a0c63be8e0b99ea78acee0be0f1013d6f7a.scope. May 15 10:40:46.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.322000 audit: BPF prog-id=170 op=LOAD May 15 10:40:46.323000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3548 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:46.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639636166626332356434623430353931343430386338656437346432 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3548 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:46.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639636166626332356434623430353931343430386338656437346432 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit: BPF prog-id=171 op=LOAD May 15 10:40:46.323000 audit[3927]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021a6f0 items=0 ppid=3548 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:46.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639636166626332356434623430353931343430386338656437346432 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit: BPF prog-id=172 op=LOAD May 15 10:40:46.323000 audit[3927]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021a738 items=0 ppid=3548 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:46.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639636166626332356434623430353931343430386338656437346432 May 15 10:40:46.323000 audit: BPF prog-id=172 op=UNLOAD May 15 10:40:46.323000 audit: BPF prog-id=171 op=UNLOAD May 15 10:40:46.323000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:46.323000 audit: BPF prog-id=173 op=LOAD May 15 10:40:46.323000 audit[3927]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021ab48 items=0 ppid=3548 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:46.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639636166626332356434623430353931343430386338656437346432 May 15 10:40:46.350038 env[1205]: time="2025-05-15T10:40:46.349986102Z" level=info msg="StartContainer for \"f9cafbc25d4b405914408c8ed74d2a0c63be8e0b99ea78acee0be0f1013d6f7a\" returns successfully" May 15 10:40:46.386811 kubelet[2060]: E0515 10:40:46.386505 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:47.166000 audit[1899]: AVC avc: denied { watch } for pid=1899 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:47.166000 audit[1899]: AVC avc: denied { watch } for pid=1899 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:47.166000 audit[1899]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002a02a80 a2=fc6 a3=0 items=0 ppid=1763 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 key=(null) May 15 10:40:47.166000 audit[1899]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003430ea0 a2=fc6 a3=0 items=0 ppid=1763 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 key=(null) May 15 10:40:47.166000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:40:47.166000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:40:47.321000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:47.321000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:47.321000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:47.321000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:47.321000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c006648120 a2=fc6 a3=0 items=0 ppid=1775 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 key=(null) May 15 10:40:47.321000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0062f4100 a2=fc6 a3=0 items=0 ppid=1775 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 key=(null) May 15 10:40:47.321000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:47.321000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:47.321000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c006f88d20 a2=fc6 a3=0 items=0 ppid=1775 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 key=(null) May 15 10:40:47.321000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:47.321000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c006dae270 a2=fc6 a3=0 items=0 ppid=1775 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 key=(null) May 15 10:40:47.321000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:47.349000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:47.349000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0069f3c20 a2=fc6 a3=0 items=0 ppid=1775 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 key=(null) May 15 10:40:47.349000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:47.349000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:47.349000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c004c31ce0 a2=fc6 a3=0 items=0 ppid=1775 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c288,c569 key=(null) May 15 10:40:47.349000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:47.437490 kubelet[2060]: I0515 10:40:47.437329 2060 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-78ddbbc6d7-fq45l" podStartSLOduration=34.565761771 podStartE2EDuration="37.437308194s" podCreationTimestamp="2025-05-15 10:40:10 +0000 UTC" firstStartedPulling="2025-05-15 10:40:43.404073843 +0000 UTC m=+53.475296026" lastFinishedPulling="2025-05-15 10:40:46.275620266 +0000 UTC m=+56.346842449" observedRunningTime="2025-05-15 10:40:46.398816119 +0000 UTC m=+56.470038302" watchObservedRunningTime="2025-05-15 10:40:47.437308194 +0000 UTC m=+57.508530377" May 15 10:40:49.331423 systemd[1]: Started sshd@15-10.0.0.58:22-10.0.0.1:39638.service. May 15 10:40:49.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.58:22-10.0.0.1:39638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:49.332420 kernel: kauditd_printk_skb: 609 callbacks suppressed May 15 10:40:49.332482 kernel: audit: type=1130 audit(1747305649.329:1252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.58:22-10.0.0.1:39638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:49.364000 audit[3978]: USER_ACCT pid=3978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:49.366708 sshd[3978]: Accepted publickey for core from 10.0.0.1 port 39638 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:49.367997 sshd[3978]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:49.365000 audit[3978]: CRED_ACQ pid=3978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:49.371883 systemd-logind[1195]: New session 16 of user core. May 15 10:40:49.372754 systemd[1]: Started session-16.scope. May 15 10:40:49.374261 kernel: audit: type=1101 audit(1747305649.364:1253): pid=3978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:49.374322 kernel: audit: type=1103 audit(1747305649.365:1254): pid=3978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:49.374344 kernel: audit: type=1006 audit(1747305649.365:1255): pid=3978 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 15 10:40:49.376635 kernel: audit: type=1300 audit(1747305649.365:1255): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe341cdec0 a2=3 a3=0 items=0 ppid=1 pid=3978 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:49.365000 audit[3978]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe341cdec0 a2=3 a3=0 items=0 ppid=1 pid=3978 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:49.365000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:49.381842 kernel: audit: type=1327 audit(1747305649.365:1255): proctitle=737368643A20636F7265205B707269765D May 15 10:40:49.381899 kernel: audit: type=1105 audit(1747305649.375:1256): pid=3978 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:49.375000 audit[3978]: USER_START pid=3978 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:49.376000 audit[3980]: CRED_ACQ pid=3980 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:49.389404 kernel: audit: type=1103 audit(1747305649.376:1257): pid=3980 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:49.481421 sshd[3978]: pam_unix(sshd:session): session closed for user core May 15 10:40:49.480000 audit[3978]: USER_END pid=3978 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:49.484085 systemd[1]: sshd@15-10.0.0.58:22-10.0.0.1:39638.service: Deactivated successfully. May 15 10:40:49.484809 systemd[1]: session-16.scope: Deactivated successfully. May 15 10:40:49.485403 systemd-logind[1195]: Session 16 logged out. Waiting for processes to exit. May 15 10:40:49.486122 systemd-logind[1195]: Removed session 16. May 15 10:40:49.480000 audit[3978]: CRED_DISP pid=3978 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:49.490596 kernel: audit: type=1106 audit(1747305649.480:1258): pid=3978 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:49.490684 kernel: audit: type=1104 audit(1747305649.480:1259): pid=3978 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:49.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.58:22-10.0.0.1:39638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:50.020590 env[1205]: time="2025-05-15T10:40:50.020543015Z" level=info msg="StopPodSandbox for \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\"" May 15 10:40:50.090158 env[1205]: 2025-05-15 10:40:50.057 [WARNING][4014] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0", GenerateName:"calico-kube-controllers-78ddbbc6d7-", Namespace:"calico-system", SelfLink:"", UID:"6f53a062-ebf2-46b9-8b99-8fafa7e0b001", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78ddbbc6d7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5", Pod:"calico-kube-controllers-78ddbbc6d7-fq45l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali26a4dad8454", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:50.090158 env[1205]: 2025-05-15 10:40:50.057 [INFO][4014] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" May 15 10:40:50.090158 env[1205]: 2025-05-15 10:40:50.057 [INFO][4014] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" iface="eth0" netns="" May 15 10:40:50.090158 env[1205]: 2025-05-15 10:40:50.057 [INFO][4014] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" May 15 10:40:50.090158 env[1205]: 2025-05-15 10:40:50.057 [INFO][4014] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" May 15 10:40:50.090158 env[1205]: 2025-05-15 10:40:50.080 [INFO][4025] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" HandleID="k8s-pod-network.58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" Workload="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" May 15 10:40:50.090158 env[1205]: 2025-05-15 10:40:50.080 [INFO][4025] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:50.090158 env[1205]: 2025-05-15 10:40:50.080 [INFO][4025] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:50.090158 env[1205]: 2025-05-15 10:40:50.085 [WARNING][4025] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" HandleID="k8s-pod-network.58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" Workload="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" May 15 10:40:50.090158 env[1205]: 2025-05-15 10:40:50.085 [INFO][4025] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" HandleID="k8s-pod-network.58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" Workload="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" May 15 10:40:50.090158 env[1205]: 2025-05-15 10:40:50.086 [INFO][4025] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:50.090158 env[1205]: 2025-05-15 10:40:50.087 [INFO][4014] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" May 15 10:40:50.090899 env[1205]: time="2025-05-15T10:40:50.090168976Z" level=info msg="TearDown network for sandbox \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\" successfully" May 15 10:40:50.090899 env[1205]: time="2025-05-15T10:40:50.090202982Z" level=info msg="StopPodSandbox for \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\" returns successfully" May 15 10:40:50.090899 env[1205]: time="2025-05-15T10:40:50.090811083Z" level=info msg="RemovePodSandbox for \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\"" May 15 10:40:50.090899 env[1205]: time="2025-05-15T10:40:50.090836181Z" level=info msg="Forcibly stopping sandbox \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\"" May 15 10:40:50.160840 env[1205]: 2025-05-15 10:40:50.129 [WARNING][4048] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0", GenerateName:"calico-kube-controllers-78ddbbc6d7-", Namespace:"calico-system", SelfLink:"", UID:"6f53a062-ebf2-46b9-8b99-8fafa7e0b001", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78ddbbc6d7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"42c6ded332e207881c9b403fb5aa95512018d3a7633378769bb3fe9206d553e5", Pod:"calico-kube-controllers-78ddbbc6d7-fq45l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali26a4dad8454", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:50.160840 env[1205]: 2025-05-15 10:40:50.129 [INFO][4048] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" May 15 10:40:50.160840 env[1205]: 2025-05-15 10:40:50.129 [INFO][4048] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" iface="eth0" netns="" May 15 10:40:50.160840 env[1205]: 2025-05-15 10:40:50.129 [INFO][4048] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" May 15 10:40:50.160840 env[1205]: 2025-05-15 10:40:50.129 [INFO][4048] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" May 15 10:40:50.160840 env[1205]: 2025-05-15 10:40:50.147 [INFO][4056] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" HandleID="k8s-pod-network.58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" Workload="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" May 15 10:40:50.160840 env[1205]: 2025-05-15 10:40:50.147 [INFO][4056] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:50.160840 env[1205]: 2025-05-15 10:40:50.147 [INFO][4056] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:50.160840 env[1205]: 2025-05-15 10:40:50.152 [WARNING][4056] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" HandleID="k8s-pod-network.58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" Workload="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" May 15 10:40:50.160840 env[1205]: 2025-05-15 10:40:50.152 [INFO][4056] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" HandleID="k8s-pod-network.58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" Workload="localhost-k8s-calico--kube--controllers--78ddbbc6d7--fq45l-eth0" May 15 10:40:50.160840 env[1205]: 2025-05-15 10:40:50.153 [INFO][4056] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:50.160840 env[1205]: 2025-05-15 10:40:50.159 [INFO][4048] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771" May 15 10:40:50.161789 env[1205]: time="2025-05-15T10:40:50.161726820Z" level=info msg="TearDown network for sandbox \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\" successfully" May 15 10:40:50.394982 env[1205]: time="2025-05-15T10:40:50.394909512Z" level=info msg="RemovePodSandbox \"58e219ec0e3b1f4448189bc4935c08a92a3a1f41ffa1c234b17e2b270c281771\" returns successfully" May 15 10:40:50.395401 env[1205]: time="2025-05-15T10:40:50.395375231Z" level=info msg="StopPodSandbox for \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\"" May 15 10:40:50.458540 env[1205]: 2025-05-15 10:40:50.429 [WARNING][4079] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b", Pod:"coredns-7db6d8ff4d-jhsth", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib0f7ebf8079", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:50.458540 env[1205]: 2025-05-15 10:40:50.429 [INFO][4079] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" May 15 10:40:50.458540 env[1205]: 2025-05-15 10:40:50.430 [INFO][4079] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" iface="eth0" netns="" May 15 10:40:50.458540 env[1205]: 2025-05-15 10:40:50.430 [INFO][4079] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" May 15 10:40:50.458540 env[1205]: 2025-05-15 10:40:50.430 [INFO][4079] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" May 15 10:40:50.458540 env[1205]: 2025-05-15 10:40:50.449 [INFO][4087] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" HandleID="k8s-pod-network.7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" Workload="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" May 15 10:40:50.458540 env[1205]: 2025-05-15 10:40:50.449 [INFO][4087] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:50.458540 env[1205]: 2025-05-15 10:40:50.449 [INFO][4087] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:50.458540 env[1205]: 2025-05-15 10:40:50.454 [WARNING][4087] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" HandleID="k8s-pod-network.7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" Workload="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" May 15 10:40:50.458540 env[1205]: 2025-05-15 10:40:50.454 [INFO][4087] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" HandleID="k8s-pod-network.7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" Workload="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" May 15 10:40:50.458540 env[1205]: 2025-05-15 10:40:50.455 [INFO][4087] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:50.458540 env[1205]: 2025-05-15 10:40:50.457 [INFO][4079] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" May 15 10:40:50.459028 env[1205]: time="2025-05-15T10:40:50.458544361Z" level=info msg="TearDown network for sandbox \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\" successfully" May 15 10:40:50.459028 env[1205]: time="2025-05-15T10:40:50.458577243Z" level=info msg="StopPodSandbox for \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\" returns successfully" May 15 10:40:50.459202 env[1205]: time="2025-05-15T10:40:50.459165767Z" level=info msg="RemovePodSandbox for \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\"" May 15 10:40:50.459272 env[1205]: time="2025-05-15T10:40:50.459207858Z" level=info msg="Forcibly stopping sandbox \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\"" May 15 10:40:50.519535 env[1205]: 2025-05-15 10:40:50.489 [WARNING][4110] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"a8b822f4-805e-4fc3-b7a9-8b4fcd0e8ac0", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"11a3d6896b74cd3b2c07ff2970b5f15286e6196319aef0d92263db42e2ddf52b", Pod:"coredns-7db6d8ff4d-jhsth", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib0f7ebf8079", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:50.519535 env[1205]: 2025-05-15 10:40:50.489 [INFO][4110] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" May 15 10:40:50.519535 env[1205]: 2025-05-15 10:40:50.489 [INFO][4110] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" iface="eth0" netns="" May 15 10:40:50.519535 env[1205]: 2025-05-15 10:40:50.489 [INFO][4110] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" May 15 10:40:50.519535 env[1205]: 2025-05-15 10:40:50.489 [INFO][4110] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" May 15 10:40:50.519535 env[1205]: 2025-05-15 10:40:50.508 [INFO][4118] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" HandleID="k8s-pod-network.7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" Workload="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" May 15 10:40:50.519535 env[1205]: 2025-05-15 10:40:50.509 [INFO][4118] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:50.519535 env[1205]: 2025-05-15 10:40:50.509 [INFO][4118] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:50.519535 env[1205]: 2025-05-15 10:40:50.514 [WARNING][4118] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" HandleID="k8s-pod-network.7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" Workload="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" May 15 10:40:50.519535 env[1205]: 2025-05-15 10:40:50.514 [INFO][4118] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" HandleID="k8s-pod-network.7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" Workload="localhost-k8s-coredns--7db6d8ff4d--jhsth-eth0" May 15 10:40:50.519535 env[1205]: 2025-05-15 10:40:50.516 [INFO][4118] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:50.519535 env[1205]: 2025-05-15 10:40:50.518 [INFO][4110] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3" May 15 10:40:50.520197 env[1205]: time="2025-05-15T10:40:50.519565417Z" level=info msg="TearDown network for sandbox \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\" successfully" May 15 10:40:50.522592 env[1205]: time="2025-05-15T10:40:50.522567872Z" level=info msg="RemovePodSandbox \"7855293e5aa24f85e504beec99631ae4552315082e2f89bef9031e3d6f8508a3\" returns successfully" May 15 10:40:50.567000 audit[1899]: AVC avc: denied { watch } for pid=1899 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:50.567000 audit[1899]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003430000 a2=fc6 a3=0 items=0 ppid=1763 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 key=(null) May 15 10:40:50.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:40:50.567000 audit[1899]: AVC avc: denied { watch } for pid=1899 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:50.567000 audit[1899]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0033d6000 a2=fc6 a3=0 items=0 ppid=1763 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 key=(null) May 15 10:40:50.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:40:50.567000 audit[1899]: AVC avc: denied { watch } for pid=1899 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:50.567000 audit[1899]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0033d6020 a2=fc6 a3=0 items=0 ppid=1763 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 key=(null) May 15 10:40:50.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:40:50.568000 audit[1899]: AVC avc: denied { watch } for pid=1899 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:50.568000 audit[1899]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0033d6040 a2=fc6 a3=0 items=0 ppid=1763 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c453 key=(null) May 15 10:40:50.568000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:40:52.030773 env[1205]: time="2025-05-15T10:40:52.030728575Z" level=info msg="StopPodSandbox for \"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\"" May 15 10:40:52.099010 env[1205]: 2025-05-15 10:40:52.069 [INFO][4141] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98" May 15 10:40:52.099010 env[1205]: 2025-05-15 10:40:52.070 [INFO][4141] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98" iface="eth0" netns="/var/run/netns/cni-6a234e00-5d61-9b4e-3866-98690d39afbd" May 15 10:40:52.099010 env[1205]: 2025-05-15 10:40:52.070 [INFO][4141] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98" iface="eth0" netns="/var/run/netns/cni-6a234e00-5d61-9b4e-3866-98690d39afbd" May 15 10:40:52.099010 env[1205]: 2025-05-15 10:40:52.070 [INFO][4141] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98" iface="eth0" netns="/var/run/netns/cni-6a234e00-5d61-9b4e-3866-98690d39afbd" May 15 10:40:52.099010 env[1205]: 2025-05-15 10:40:52.070 [INFO][4141] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98" May 15 10:40:52.099010 env[1205]: 2025-05-15 10:40:52.070 [INFO][4141] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98" May 15 10:40:52.099010 env[1205]: 2025-05-15 10:40:52.089 [INFO][4149] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98" HandleID="k8s-pod-network.2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98" Workload="localhost-k8s-calico--apiserver--85fd7b7cb7--vgq28-eth0" May 15 10:40:52.099010 env[1205]: 2025-05-15 10:40:52.089 [INFO][4149] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:52.099010 env[1205]: 2025-05-15 10:40:52.089 [INFO][4149] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:52.099010 env[1205]: 2025-05-15 10:40:52.094 [WARNING][4149] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98" HandleID="k8s-pod-network.2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98" Workload="localhost-k8s-calico--apiserver--85fd7b7cb7--vgq28-eth0" May 15 10:40:52.099010 env[1205]: 2025-05-15 10:40:52.094 [INFO][4149] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98" HandleID="k8s-pod-network.2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98" Workload="localhost-k8s-calico--apiserver--85fd7b7cb7--vgq28-eth0" May 15 10:40:52.099010 env[1205]: 2025-05-15 10:40:52.096 [INFO][4149] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:52.099010 env[1205]: 2025-05-15 10:40:52.097 [INFO][4141] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98" May 15 10:40:52.099741 env[1205]: time="2025-05-15T10:40:52.099198233Z" level=info msg="TearDown network for sandbox \"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\" successfully" May 15 10:40:52.099741 env[1205]: time="2025-05-15T10:40:52.099237728Z" level=info msg="StopPodSandbox for \"2eca2c39ce15b0b914ff32efe9bc7ed950309e12e28ce3fa32729125b5058e98\" returns successfully" May 15 10:40:52.099975 env[1205]: time="2025-05-15T10:40:52.099938917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85fd7b7cb7-vgq28,Uid:372820ce-5c22-42ae-a0c2-10ca7c493652,Namespace:calico-apiserver,Attempt:1,}" May 15 10:40:52.101523 systemd[1]: run-netns-cni\x2d6a234e00\x2d5d61\x2d9b4e\x2d3866\x2d98690d39afbd.mount: Deactivated successfully. May 15 10:40:52.198334 systemd-networkd[1024]: cali7c7a11e961d: Link UP May 15 10:40:52.201013 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:40:52.201218 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7c7a11e961d: link becomes ready May 15 10:40:52.201276 systemd-networkd[1024]: cali7c7a11e961d: Gained carrier May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.136 [INFO][4157] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--85fd7b7cb7--vgq28-eth0 calico-apiserver-85fd7b7cb7- calico-apiserver 372820ce-5c22-42ae-a0c2-10ca7c493652 979 0 2025-05-15 10:40:10 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:85fd7b7cb7 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-85fd7b7cb7-vgq28 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7c7a11e961d [] []}} ContainerID="ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" Namespace="calico-apiserver" Pod="calico-apiserver-85fd7b7cb7-vgq28" WorkloadEndpoint="localhost-k8s-calico--apiserver--85fd7b7cb7--vgq28-" May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.137 [INFO][4157] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" Namespace="calico-apiserver" Pod="calico-apiserver-85fd7b7cb7-vgq28" WorkloadEndpoint="localhost-k8s-calico--apiserver--85fd7b7cb7--vgq28-eth0" May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.162 [INFO][4171] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" HandleID="k8s-pod-network.ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" Workload="localhost-k8s-calico--apiserver--85fd7b7cb7--vgq28-eth0" May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.169 [INFO][4171] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" HandleID="k8s-pod-network.ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" Workload="localhost-k8s-calico--apiserver--85fd7b7cb7--vgq28-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000503440), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-85fd7b7cb7-vgq28", "timestamp":"2025-05-15 10:40:52.16224848 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.169 [INFO][4171] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.170 [INFO][4171] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.170 [INFO][4171] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.171 [INFO][4171] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" host="localhost" May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.174 [INFO][4171] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.178 [INFO][4171] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.179 [INFO][4171] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.181 [INFO][4171] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.181 [INFO][4171] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" host="localhost" May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.182 [INFO][4171] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3 May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.188 [INFO][4171] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" host="localhost" May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.192 [INFO][4171] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" host="localhost" May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.192 [INFO][4171] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" host="localhost" May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.192 [INFO][4171] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:52.215815 env[1205]: 2025-05-15 10:40:52.192 [INFO][4171] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" HandleID="k8s-pod-network.ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" Workload="localhost-k8s-calico--apiserver--85fd7b7cb7--vgq28-eth0" May 15 10:40:52.216457 env[1205]: 2025-05-15 10:40:52.194 [INFO][4157] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" Namespace="calico-apiserver" Pod="calico-apiserver-85fd7b7cb7-vgq28" WorkloadEndpoint="localhost-k8s-calico--apiserver--85fd7b7cb7--vgq28-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--85fd7b7cb7--vgq28-eth0", GenerateName:"calico-apiserver-85fd7b7cb7-", Namespace:"calico-apiserver", SelfLink:"", UID:"372820ce-5c22-42ae-a0c2-10ca7c493652", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85fd7b7cb7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-85fd7b7cb7-vgq28", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7c7a11e961d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:52.216457 env[1205]: 2025-05-15 10:40:52.195 [INFO][4157] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" Namespace="calico-apiserver" Pod="calico-apiserver-85fd7b7cb7-vgq28" WorkloadEndpoint="localhost-k8s-calico--apiserver--85fd7b7cb7--vgq28-eth0" May 15 10:40:52.216457 env[1205]: 2025-05-15 10:40:52.196 [INFO][4157] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7c7a11e961d ContainerID="ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" Namespace="calico-apiserver" Pod="calico-apiserver-85fd7b7cb7-vgq28" WorkloadEndpoint="localhost-k8s-calico--apiserver--85fd7b7cb7--vgq28-eth0" May 15 10:40:52.216457 env[1205]: 2025-05-15 10:40:52.201 [INFO][4157] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" Namespace="calico-apiserver" Pod="calico-apiserver-85fd7b7cb7-vgq28" WorkloadEndpoint="localhost-k8s-calico--apiserver--85fd7b7cb7--vgq28-eth0" May 15 10:40:52.216457 env[1205]: 2025-05-15 10:40:52.201 [INFO][4157] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" Namespace="calico-apiserver" Pod="calico-apiserver-85fd7b7cb7-vgq28" WorkloadEndpoint="localhost-k8s-calico--apiserver--85fd7b7cb7--vgq28-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--85fd7b7cb7--vgq28-eth0", GenerateName:"calico-apiserver-85fd7b7cb7-", Namespace:"calico-apiserver", SelfLink:"", UID:"372820ce-5c22-42ae-a0c2-10ca7c493652", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85fd7b7cb7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3", Pod:"calico-apiserver-85fd7b7cb7-vgq28", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7c7a11e961d", MAC:"ce:bc:5e:3e:fe:ca", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:52.216457 env[1205]: 2025-05-15 10:40:52.213 [INFO][4157] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3" Namespace="calico-apiserver" Pod="calico-apiserver-85fd7b7cb7-vgq28" WorkloadEndpoint="localhost-k8s-calico--apiserver--85fd7b7cb7--vgq28-eth0" May 15 10:40:52.219000 audit[4191]: NETFILTER_CFG table=filter:105 family=2 entries=48 op=nft_register_chain pid=4191 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:40:52.219000 audit[4191]: SYSCALL arch=c000003e syscall=46 success=yes exit=25868 a0=3 a1=7fffcaae2f10 a2=0 a3=7fffcaae2efc items=0 ppid=3717 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:52.219000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:40:52.227267 env[1205]: time="2025-05-15T10:40:52.227186970Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:40:52.227267 env[1205]: time="2025-05-15T10:40:52.227241935Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:40:52.227267 env[1205]: time="2025-05-15T10:40:52.227253127Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:40:52.227454 env[1205]: time="2025-05-15T10:40:52.227359580Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3 pid=4203 runtime=io.containerd.runc.v2 May 15 10:40:52.241695 systemd[1]: Started cri-containerd-ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3.scope. May 15 10:40:52.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.253000 audit: BPF prog-id=174 op=LOAD May 15 10:40:52.254000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4203 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:52.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566356364386436353637396665343865616565303437626636373031 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4203 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:52.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566356364386436353637396665343865616565303437626636373031 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit: BPF prog-id=175 op=LOAD May 15 10:40:52.254000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00036c000 items=0 ppid=4203 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:52.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566356364386436353637396665343865616565303437626636373031 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit: BPF prog-id=176 op=LOAD May 15 10:40:52.254000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00036c048 items=0 ppid=4203 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:52.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566356364386436353637396665343865616565303437626636373031 May 15 10:40:52.254000 audit: BPF prog-id=176 op=UNLOAD May 15 10:40:52.254000 audit: BPF prog-id=175 op=UNLOAD May 15 10:40:52.254000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { perfmon } for pid=4213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit[4213]: AVC avc: denied { bpf } for pid=4213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:52.254000 audit: BPF prog-id=177 op=LOAD May 15 10:40:52.254000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00036c458 items=0 ppid=4203 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:52.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566356364386436353637396665343865616565303437626636373031 May 15 10:40:52.255882 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:40:52.275777 env[1205]: time="2025-05-15T10:40:52.275723411Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85fd7b7cb7-vgq28,Uid:372820ce-5c22-42ae-a0c2-10ca7c493652,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3\"" May 15 10:40:52.277733 env[1205]: time="2025-05-15T10:40:52.277699382Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:40:53.030393 env[1205]: time="2025-05-15T10:40:53.030306092Z" level=info msg="StopPodSandbox for \"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\"" May 15 10:40:53.030737 env[1205]: time="2025-05-15T10:40:53.030714701Z" level=info msg="StopPodSandbox for \"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\"" May 15 10:40:53.279961 env[1205]: 2025-05-15 10:40:53.249 [INFO][4268] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761" May 15 10:40:53.279961 env[1205]: 2025-05-15 10:40:53.249 [INFO][4268] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761" iface="eth0" netns="/var/run/netns/cni-9ea4a172-8c2b-785a-043a-b4220fbe17e5" May 15 10:40:53.279961 env[1205]: 2025-05-15 10:40:53.249 [INFO][4268] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761" iface="eth0" netns="/var/run/netns/cni-9ea4a172-8c2b-785a-043a-b4220fbe17e5" May 15 10:40:53.279961 env[1205]: 2025-05-15 10:40:53.249 [INFO][4268] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761" iface="eth0" netns="/var/run/netns/cni-9ea4a172-8c2b-785a-043a-b4220fbe17e5" May 15 10:40:53.279961 env[1205]: 2025-05-15 10:40:53.249 [INFO][4268] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761" May 15 10:40:53.279961 env[1205]: 2025-05-15 10:40:53.250 [INFO][4268] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761" May 15 10:40:53.279961 env[1205]: 2025-05-15 10:40:53.269 [INFO][4286] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761" HandleID="k8s-pod-network.44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761" Workload="localhost-k8s-coredns--7db6d8ff4d--tbr5q-eth0" May 15 10:40:53.279961 env[1205]: 2025-05-15 10:40:53.269 [INFO][4286] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:53.279961 env[1205]: 2025-05-15 10:40:53.269 [INFO][4286] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:53.279961 env[1205]: 2025-05-15 10:40:53.275 [WARNING][4286] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761" HandleID="k8s-pod-network.44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761" Workload="localhost-k8s-coredns--7db6d8ff4d--tbr5q-eth0" May 15 10:40:53.279961 env[1205]: 2025-05-15 10:40:53.275 [INFO][4286] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761" HandleID="k8s-pod-network.44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761" Workload="localhost-k8s-coredns--7db6d8ff4d--tbr5q-eth0" May 15 10:40:53.279961 env[1205]: 2025-05-15 10:40:53.277 [INFO][4286] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:53.279961 env[1205]: 2025-05-15 10:40:53.278 [INFO][4268] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761" May 15 10:40:53.282465 systemd[1]: run-netns-cni\x2d9ea4a172\x2d8c2b\x2d785a\x2d043a\x2db4220fbe17e5.mount: Deactivated successfully. May 15 10:40:53.282712 env[1205]: time="2025-05-15T10:40:53.282476672Z" level=info msg="TearDown network for sandbox \"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\" successfully" May 15 10:40:53.282712 env[1205]: time="2025-05-15T10:40:53.282513261Z" level=info msg="StopPodSandbox for \"44c490a981db3a0696d319d86b92e37275ae3a1123aaf6ba19bc4a434cce7761\" returns successfully" May 15 10:40:53.282891 kubelet[2060]: E0515 10:40:53.282861 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:53.283631 env[1205]: time="2025-05-15T10:40:53.283583162Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-tbr5q,Uid:d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d,Namespace:kube-system,Attempt:1,}" May 15 10:40:53.329690 env[1205]: 2025-05-15 10:40:53.249 [INFO][4269] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4" May 15 10:40:53.329690 env[1205]: 2025-05-15 10:40:53.249 [INFO][4269] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4" iface="eth0" netns="/var/run/netns/cni-b7010ff5-af51-a5c9-2dbc-f254128897e6" May 15 10:40:53.329690 env[1205]: 2025-05-15 10:40:53.249 [INFO][4269] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4" iface="eth0" netns="/var/run/netns/cni-b7010ff5-af51-a5c9-2dbc-f254128897e6" May 15 10:40:53.329690 env[1205]: 2025-05-15 10:40:53.249 [INFO][4269] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4" iface="eth0" netns="/var/run/netns/cni-b7010ff5-af51-a5c9-2dbc-f254128897e6" May 15 10:40:53.329690 env[1205]: 2025-05-15 10:40:53.250 [INFO][4269] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4" May 15 10:40:53.329690 env[1205]: 2025-05-15 10:40:53.250 [INFO][4269] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4" May 15 10:40:53.329690 env[1205]: 2025-05-15 10:40:53.318 [INFO][4287] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4" HandleID="k8s-pod-network.3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4" Workload="localhost-k8s-csi--node--driver--6mxq2-eth0" May 15 10:40:53.329690 env[1205]: 2025-05-15 10:40:53.318 [INFO][4287] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:53.329690 env[1205]: 2025-05-15 10:40:53.318 [INFO][4287] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:53.329690 env[1205]: 2025-05-15 10:40:53.324 [WARNING][4287] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4" HandleID="k8s-pod-network.3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4" Workload="localhost-k8s-csi--node--driver--6mxq2-eth0" May 15 10:40:53.329690 env[1205]: 2025-05-15 10:40:53.324 [INFO][4287] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4" HandleID="k8s-pod-network.3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4" Workload="localhost-k8s-csi--node--driver--6mxq2-eth0" May 15 10:40:53.329690 env[1205]: 2025-05-15 10:40:53.326 [INFO][4287] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:53.329690 env[1205]: 2025-05-15 10:40:53.328 [INFO][4269] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4" May 15 10:40:53.330256 env[1205]: time="2025-05-15T10:40:53.329786520Z" level=info msg="TearDown network for sandbox \"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\" successfully" May 15 10:40:53.330256 env[1205]: time="2025-05-15T10:40:53.329818101Z" level=info msg="StopPodSandbox for \"3722c2c20ae617b8d2fe2f1795794ec24401ff5fd6c32d41164bc7d98f395ef4\" returns successfully" May 15 10:40:53.332114 systemd[1]: run-netns-cni\x2db7010ff5\x2daf51\x2da5c9\x2d2dbc\x2df254128897e6.mount: Deactivated successfully. May 15 10:40:53.332510 env[1205]: time="2025-05-15T10:40:53.332462805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6mxq2,Uid:832e5ea9-1687-4404-aa5d-bd6cc85411ec,Namespace:calico-system,Attempt:1,}" May 15 10:40:53.449391 systemd-networkd[1024]: cali66756a48c27: Link UP May 15 10:40:53.451787 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:40:53.451843 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali66756a48c27: link becomes ready May 15 10:40:53.452260 systemd-networkd[1024]: cali66756a48c27: Gained carrier May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.379 [INFO][4303] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--tbr5q-eth0 coredns-7db6d8ff4d- kube-system d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d 988 0 2025-05-15 10:40:04 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-tbr5q eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali66756a48c27 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-tbr5q" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--tbr5q-" May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.379 [INFO][4303] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-tbr5q" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--tbr5q-eth0" May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.408 [INFO][4339] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" HandleID="k8s-pod-network.5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" Workload="localhost-k8s-coredns--7db6d8ff4d--tbr5q-eth0" May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.416 [INFO][4339] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" HandleID="k8s-pod-network.5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" Workload="localhost-k8s-coredns--7db6d8ff4d--tbr5q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000435740), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-tbr5q", "timestamp":"2025-05-15 10:40:53.408586653 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.416 [INFO][4339] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.416 [INFO][4339] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.416 [INFO][4339] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.417 [INFO][4339] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" host="localhost" May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.421 [INFO][4339] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.427 [INFO][4339] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.428 [INFO][4339] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.430 [INFO][4339] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.430 [INFO][4339] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" host="localhost" May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.431 [INFO][4339] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.435 [INFO][4339] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" host="localhost" May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.443 [INFO][4339] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" host="localhost" May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.443 [INFO][4339] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" host="localhost" May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.443 [INFO][4339] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:53.469040 env[1205]: 2025-05-15 10:40:53.443 [INFO][4339] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" HandleID="k8s-pod-network.5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" Workload="localhost-k8s-coredns--7db6d8ff4d--tbr5q-eth0" May 15 10:40:53.470567 env[1205]: 2025-05-15 10:40:53.447 [INFO][4303] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-tbr5q" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--tbr5q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--tbr5q-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d", ResourceVersion:"988", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-tbr5q", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali66756a48c27", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:53.470567 env[1205]: 2025-05-15 10:40:53.447 [INFO][4303] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-tbr5q" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--tbr5q-eth0" May 15 10:40:53.470567 env[1205]: 2025-05-15 10:40:53.447 [INFO][4303] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali66756a48c27 ContainerID="5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-tbr5q" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--tbr5q-eth0" May 15 10:40:53.470567 env[1205]: 2025-05-15 10:40:53.451 [INFO][4303] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-tbr5q" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--tbr5q-eth0" May 15 10:40:53.470567 env[1205]: 2025-05-15 10:40:53.452 [INFO][4303] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-tbr5q" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--tbr5q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--tbr5q-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d", ResourceVersion:"988", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c", Pod:"coredns-7db6d8ff4d-tbr5q", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali66756a48c27", MAC:"fa:b1:99:7f:67:37", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:53.470567 env[1205]: 2025-05-15 10:40:53.465 [INFO][4303] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c" Namespace="kube-system" Pod="coredns-7db6d8ff4d-tbr5q" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--tbr5q-eth0" May 15 10:40:53.478000 audit[4362]: NETFILTER_CFG table=filter:106 family=2 entries=38 op=nft_register_chain pid=4362 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:40:53.478000 audit[4362]: SYSCALL arch=c000003e syscall=46 success=yes exit=19408 a0=3 a1=7ffe89717e70 a2=0 a3=7ffe89717e5c items=0 ppid=3717 pid=4362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.478000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:40:53.486356 systemd-networkd[1024]: cali269f1d3a59e: Link UP May 15 10:40:53.488590 systemd-networkd[1024]: cali269f1d3a59e: Gained carrier May 15 10:40:53.488704 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali269f1d3a59e: link becomes ready May 15 10:40:53.504132 env[1205]: time="2025-05-15T10:40:53.504056463Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:40:53.504315 env[1205]: time="2025-05-15T10:40:53.504107379Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:40:53.504315 env[1205]: time="2025-05-15T10:40:53.504118571Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:40:53.504495 env[1205]: time="2025-05-15T10:40:53.504446947Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c pid=4370 runtime=io.containerd.runc.v2 May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.377 [INFO][4315] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--6mxq2-eth0 csi-node-driver- calico-system 832e5ea9-1687-4404-aa5d-bd6cc85411ec 989 0 2025-05-15 10:40:10 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-6mxq2 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali269f1d3a59e [] []}} ContainerID="40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" Namespace="calico-system" Pod="csi-node-driver-6mxq2" WorkloadEndpoint="localhost-k8s-csi--node--driver--6mxq2-" May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.377 [INFO][4315] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" Namespace="calico-system" Pod="csi-node-driver-6mxq2" WorkloadEndpoint="localhost-k8s-csi--node--driver--6mxq2-eth0" May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.419 [INFO][4333] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" HandleID="k8s-pod-network.40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" Workload="localhost-k8s-csi--node--driver--6mxq2-eth0" May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.427 [INFO][4333] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" HandleID="k8s-pod-network.40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" Workload="localhost-k8s-csi--node--driver--6mxq2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d0e0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-6mxq2", "timestamp":"2025-05-15 10:40:53.419352979 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.428 [INFO][4333] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.443 [INFO][4333] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.443 [INFO][4333] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.445 [INFO][4333] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" host="localhost" May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.450 [INFO][4333] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.456 [INFO][4333] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.457 [INFO][4333] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.465 [INFO][4333] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.465 [INFO][4333] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" host="localhost" May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.469 [INFO][4333] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.475 [INFO][4333] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" host="localhost" May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.481 [INFO][4333] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" host="localhost" May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.481 [INFO][4333] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" host="localhost" May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.481 [INFO][4333] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:53.509876 env[1205]: 2025-05-15 10:40:53.481 [INFO][4333] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" HandleID="k8s-pod-network.40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" Workload="localhost-k8s-csi--node--driver--6mxq2-eth0" May 15 10:40:53.510602 env[1205]: 2025-05-15 10:40:53.484 [INFO][4315] cni-plugin/k8s.go 386: Populated endpoint ContainerID="40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" Namespace="calico-system" Pod="csi-node-driver-6mxq2" WorkloadEndpoint="localhost-k8s-csi--node--driver--6mxq2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--6mxq2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"832e5ea9-1687-4404-aa5d-bd6cc85411ec", ResourceVersion:"989", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-6mxq2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali269f1d3a59e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:53.510602 env[1205]: 2025-05-15 10:40:53.484 [INFO][4315] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" Namespace="calico-system" Pod="csi-node-driver-6mxq2" WorkloadEndpoint="localhost-k8s-csi--node--driver--6mxq2-eth0" May 15 10:40:53.510602 env[1205]: 2025-05-15 10:40:53.484 [INFO][4315] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali269f1d3a59e ContainerID="40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" Namespace="calico-system" Pod="csi-node-driver-6mxq2" WorkloadEndpoint="localhost-k8s-csi--node--driver--6mxq2-eth0" May 15 10:40:53.510602 env[1205]: 2025-05-15 10:40:53.489 [INFO][4315] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" Namespace="calico-system" Pod="csi-node-driver-6mxq2" WorkloadEndpoint="localhost-k8s-csi--node--driver--6mxq2-eth0" May 15 10:40:53.510602 env[1205]: 2025-05-15 10:40:53.489 [INFO][4315] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" Namespace="calico-system" Pod="csi-node-driver-6mxq2" WorkloadEndpoint="localhost-k8s-csi--node--driver--6mxq2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--6mxq2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"832e5ea9-1687-4404-aa5d-bd6cc85411ec", ResourceVersion:"989", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de", Pod:"csi-node-driver-6mxq2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali269f1d3a59e", MAC:"86:fe:e0:6c:43:04", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:53.510602 env[1205]: 2025-05-15 10:40:53.503 [INFO][4315] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de" Namespace="calico-system" Pod="csi-node-driver-6mxq2" WorkloadEndpoint="localhost-k8s-csi--node--driver--6mxq2-eth0" May 15 10:40:53.516553 systemd[1]: Started cri-containerd-5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c.scope. May 15 10:40:53.519000 audit[4399]: NETFILTER_CFG table=filter:107 family=2 entries=52 op=nft_register_chain pid=4399 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:40:53.519000 audit[4399]: SYSCALL arch=c000003e syscall=46 success=yes exit=25056 a0=3 a1=7ffe85cc5520 a2=0 a3=7ffe85cc550c items=0 ppid=3717 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.519000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:40:53.528099 env[1205]: time="2025-05-15T10:40:53.528031202Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:40:53.528274 env[1205]: time="2025-05-15T10:40:53.528076919Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:40:53.528274 env[1205]: time="2025-05-15T10:40:53.528086888Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:40:53.529008 env[1205]: time="2025-05-15T10:40:53.528572584Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de pid=4420 runtime=io.containerd.runc.v2 May 15 10:40:53.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit: BPF prog-id=178 op=LOAD May 15 10:40:53.529000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4370 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363065386163353134303137626165303265326166613135326363 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4370 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363065386163353134303137626165303265326166613135326363 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit: BPF prog-id=179 op=LOAD May 15 10:40:53.529000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00027ddf0 items=0 ppid=4370 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363065386163353134303137626165303265326166613135326363 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit: BPF prog-id=180 op=LOAD May 15 10:40:53.529000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00027de38 items=0 ppid=4370 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363065386163353134303137626165303265326166613135326363 May 15 10:40:53.529000 audit: BPF prog-id=180 op=UNLOAD May 15 10:40:53.529000 audit: BPF prog-id=179 op=UNLOAD May 15 10:40:53.529000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.529000 audit: BPF prog-id=181 op=LOAD May 15 10:40:53.529000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f6248 items=0 ppid=4370 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363065386163353134303137626165303265326166613135326363 May 15 10:40:53.531870 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:40:53.539114 systemd[1]: Started cri-containerd-40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de.scope. May 15 10:40:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.550000 audit: BPF prog-id=182 op=LOAD May 15 10:40:53.551000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=4420 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430383430333734633835396564386132633561633866363465393533 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=4420 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430383430333734633835396564386132633561633866363465393533 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit: BPF prog-id=183 op=LOAD May 15 10:40:53.551000 audit[4431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c000342300 items=0 ppid=4420 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430383430333734633835396564386132633561633866363465393533 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit: BPF prog-id=184 op=LOAD May 15 10:40:53.551000 audit[4431]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c000342348 items=0 ppid=4420 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430383430333734633835396564386132633561633866363465393533 May 15 10:40:53.551000 audit: BPF prog-id=184 op=UNLOAD May 15 10:40:53.551000 audit: BPF prog-id=183 op=UNLOAD May 15 10:40:53.551000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.551000 audit: BPF prog-id=185 op=LOAD May 15 10:40:53.551000 audit[4431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c000342758 items=0 ppid=4420 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430383430333734633835396564386132633561633866363465393533 May 15 10:40:53.552771 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:40:53.557700 env[1205]: time="2025-05-15T10:40:53.557665417Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-tbr5q,Uid:d646a4fa-1a9e-42e5-9274-4bcb2d4fa87d,Namespace:kube-system,Attempt:1,} returns sandbox id \"5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c\"" May 15 10:40:53.558682 kubelet[2060]: E0515 10:40:53.558476 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:53.560251 env[1205]: time="2025-05-15T10:40:53.560228615Z" level=info msg="CreateContainer within sandbox \"5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:40:53.564140 env[1205]: time="2025-05-15T10:40:53.564049563Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6mxq2,Uid:832e5ea9-1687-4404-aa5d-bd6cc85411ec,Namespace:calico-system,Attempt:1,} returns sandbox id \"40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de\"" May 15 10:40:53.573552 env[1205]: time="2025-05-15T10:40:53.573518685Z" level=info msg="CreateContainer within sandbox \"5260e8ac514017bae02e2afa152cc7caed6dc801009187aea4c94ef15b151a1c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"5c50e0112b4950015ea164d5475ce28f046e273fd0bfd85c32117ce706aa148b\"" May 15 10:40:53.574373 env[1205]: time="2025-05-15T10:40:53.574334641Z" level=info msg="StartContainer for \"5c50e0112b4950015ea164d5475ce28f046e273fd0bfd85c32117ce706aa148b\"" May 15 10:40:53.587505 systemd[1]: Started cri-containerd-5c50e0112b4950015ea164d5475ce28f046e273fd0bfd85c32117ce706aa148b.scope. May 15 10:40:53.589900 systemd-networkd[1024]: cali7c7a11e961d: Gained IPv6LL May 15 10:40:53.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.598000 audit: BPF prog-id=186 op=LOAD May 15 10:40:53.599000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4370 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563353065303131326234393530303135656131363464353437356365 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4370 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563353065303131326234393530303135656131363464353437356365 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit: BPF prog-id=187 op=LOAD May 15 10:40:53.599000 audit[4466]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000389520 items=0 ppid=4370 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563353065303131326234393530303135656131363464353437356365 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit: BPF prog-id=188 op=LOAD May 15 10:40:53.599000 audit[4466]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000389568 items=0 ppid=4370 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563353065303131326234393530303135656131363464353437356365 May 15 10:40:53.599000 audit: BPF prog-id=188 op=UNLOAD May 15 10:40:53.599000 audit: BPF prog-id=187 op=UNLOAD May 15 10:40:53.599000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:53.599000 audit: BPF prog-id=189 op=LOAD May 15 10:40:53.599000 audit[4466]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000389978 items=0 ppid=4370 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563353065303131326234393530303135656131363464353437356365 May 15 10:40:53.611884 env[1205]: time="2025-05-15T10:40:53.611828226Z" level=info msg="StartContainer for \"5c50e0112b4950015ea164d5475ce28f046e273fd0bfd85c32117ce706aa148b\" returns successfully" May 15 10:40:54.407187 kubelet[2060]: E0515 10:40:54.406974 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:54.420682 kubelet[2060]: I0515 10:40:54.420363 2060 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-tbr5q" podStartSLOduration=50.420341308 podStartE2EDuration="50.420341308s" podCreationTimestamp="2025-05-15 10:40:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:40:54.420013984 +0000 UTC m=+64.491236167" watchObservedRunningTime="2025-05-15 10:40:54.420341308 +0000 UTC m=+64.491563501" May 15 10:40:54.429000 audit[4499]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=4499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:54.440561 kernel: kauditd_printk_skb: 250 callbacks suppressed May 15 10:40:54.440732 kernel: audit: type=1325 audit(1747305654.429:1340): table=filter:108 family=2 entries=10 op=nft_register_rule pid=4499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:54.440772 kernel: audit: type=1300 audit(1747305654.429:1340): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffedb6f9180 a2=0 a3=7ffedb6f916c items=0 ppid=2219 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:54.429000 audit[4499]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffedb6f9180 a2=0 a3=7ffedb6f916c items=0 ppid=2219 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:54.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:54.444678 kernel: audit: type=1327 audit(1747305654.429:1340): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:54.446000 audit[4499]: NETFILTER_CFG table=nat:109 family=2 entries=44 op=nft_register_rule pid=4499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:54.446000 audit[4499]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffedb6f9180 a2=0 a3=7ffedb6f916c items=0 ppid=2219 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:54.454676 kernel: audit: type=1325 audit(1747305654.446:1341): table=nat:109 family=2 entries=44 op=nft_register_rule pid=4499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:54.454730 kernel: audit: type=1300 audit(1747305654.446:1341): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffedb6f9180 a2=0 a3=7ffedb6f916c items=0 ppid=2219 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:54.454757 kernel: audit: type=1327 audit(1747305654.446:1341): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:54.446000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:54.470719 kernel: audit: type=1325 audit(1747305654.462:1342): table=filter:110 family=2 entries=10 op=nft_register_rule pid=4501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:54.470802 kernel: audit: type=1300 audit(1747305654.462:1342): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffca2a51f50 a2=0 a3=7ffca2a51f3c items=0 ppid=2219 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:54.462000 audit[4501]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=4501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:54.462000 audit[4501]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffca2a51f50 a2=0 a3=7ffca2a51f3c items=0 ppid=2219 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:54.462000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:54.473184 kernel: audit: type=1327 audit(1747305654.462:1342): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:54.477000 audit[4501]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=4501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:54.477000 audit[4501]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffca2a51f50 a2=0 a3=7ffca2a51f3c items=0 ppid=2219 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:54.477000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:54.481683 kernel: audit: type=1325 audit(1747305654.477:1343): table=nat:111 family=2 entries=56 op=nft_register_chain pid=4501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:54.485323 systemd[1]: Started sshd@16-10.0.0.58:22-10.0.0.1:58618.service. May 15 10:40:54.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.58:22-10.0.0.1:58618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:54.520000 audit[4504]: USER_ACCT pid=4504 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:54.521268 sshd[4504]: Accepted publickey for core from 10.0.0.1 port 58618 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:54.521000 audit[4504]: CRED_ACQ pid=4504 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:54.521000 audit[4504]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7e5d7480 a2=3 a3=0 items=0 ppid=1 pid=4504 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:54.521000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:54.522301 sshd[4504]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:54.525439 systemd-logind[1195]: New session 17 of user core. May 15 10:40:54.526156 systemd[1]: Started session-17.scope. May 15 10:40:54.528000 audit[4504]: USER_START pid=4504 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:54.529000 audit[4506]: CRED_ACQ pid=4506 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:54.549558 systemd-networkd[1024]: cali269f1d3a59e: Gained IPv6LL May 15 10:40:54.657201 sshd[4504]: pam_unix(sshd:session): session closed for user core May 15 10:40:54.657000 audit[4504]: USER_END pid=4504 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:54.657000 audit[4504]: CRED_DISP pid=4504 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:54.659311 systemd[1]: sshd@16-10.0.0.58:22-10.0.0.1:58618.service: Deactivated successfully. May 15 10:40:54.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.58:22-10.0.0.1:58618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:54.660233 systemd[1]: session-17.scope: Deactivated successfully. May 15 10:40:54.660920 systemd-logind[1195]: Session 17 logged out. Waiting for processes to exit. May 15 10:40:54.661611 systemd-logind[1195]: Removed session 17. May 15 10:40:55.030589 env[1205]: time="2025-05-15T10:40:55.030470297Z" level=info msg="StopPodSandbox for \"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\"" May 15 10:40:55.095526 env[1205]: 2025-05-15 10:40:55.065 [INFO][4539] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a" May 15 10:40:55.095526 env[1205]: 2025-05-15 10:40:55.065 [INFO][4539] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a" iface="eth0" netns="/var/run/netns/cni-f025cb6c-cbc2-e6ce-fcaa-6e8b5bb4ab6c" May 15 10:40:55.095526 env[1205]: 2025-05-15 10:40:55.065 [INFO][4539] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a" iface="eth0" netns="/var/run/netns/cni-f025cb6c-cbc2-e6ce-fcaa-6e8b5bb4ab6c" May 15 10:40:55.095526 env[1205]: 2025-05-15 10:40:55.066 [INFO][4539] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a" iface="eth0" netns="/var/run/netns/cni-f025cb6c-cbc2-e6ce-fcaa-6e8b5bb4ab6c" May 15 10:40:55.095526 env[1205]: 2025-05-15 10:40:55.066 [INFO][4539] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a" May 15 10:40:55.095526 env[1205]: 2025-05-15 10:40:55.066 [INFO][4539] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a" May 15 10:40:55.095526 env[1205]: 2025-05-15 10:40:55.087 [INFO][4548] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a" HandleID="k8s-pod-network.bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a" Workload="localhost-k8s-calico--apiserver--85fd7b7cb7--h2mp7-eth0" May 15 10:40:55.095526 env[1205]: 2025-05-15 10:40:55.087 [INFO][4548] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:55.095526 env[1205]: 2025-05-15 10:40:55.087 [INFO][4548] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:55.095526 env[1205]: 2025-05-15 10:40:55.091 [WARNING][4548] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a" HandleID="k8s-pod-network.bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a" Workload="localhost-k8s-calico--apiserver--85fd7b7cb7--h2mp7-eth0" May 15 10:40:55.095526 env[1205]: 2025-05-15 10:40:55.092 [INFO][4548] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a" HandleID="k8s-pod-network.bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a" Workload="localhost-k8s-calico--apiserver--85fd7b7cb7--h2mp7-eth0" May 15 10:40:55.095526 env[1205]: 2025-05-15 10:40:55.093 [INFO][4548] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:55.095526 env[1205]: 2025-05-15 10:40:55.094 [INFO][4539] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a" May 15 10:40:55.101611 env[1205]: time="2025-05-15T10:40:55.095701861Z" level=info msg="TearDown network for sandbox \"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\" successfully" May 15 10:40:55.101611 env[1205]: time="2025-05-15T10:40:55.095738440Z" level=info msg="StopPodSandbox for \"bfbb71f64c6eb5ce89cef881a287d63e0b95f7435f66cc5a3ce575f9f972565a\" returns successfully" May 15 10:40:55.101611 env[1205]: time="2025-05-15T10:40:55.096750259Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85fd7b7cb7-h2mp7,Uid:fcb83224-37f0-4883-9e08-98a8f6194cef,Namespace:calico-apiserver,Attempt:1,}" May 15 10:40:55.098106 systemd[1]: run-netns-cni\x2df025cb6c\x2dcbc2\x2de6ce\x2dfcaa\x2d6e8b5bb4ab6c.mount: Deactivated successfully. May 15 10:40:55.252786 systemd-networkd[1024]: cali66756a48c27: Gained IPv6LL May 15 10:40:55.280918 env[1205]: time="2025-05-15T10:40:55.280815819Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:55.282881 env[1205]: time="2025-05-15T10:40:55.282835248Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:55.284329 env[1205]: time="2025-05-15T10:40:55.284298627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:55.287755 env[1205]: time="2025-05-15T10:40:55.287718633Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:55.288329 env[1205]: time="2025-05-15T10:40:55.288287067Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 10:40:55.290471 env[1205]: time="2025-05-15T10:40:55.290430101Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 10:40:55.291578 env[1205]: time="2025-05-15T10:40:55.291528965Z" level=info msg="CreateContainer within sandbox \"ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:40:55.314122 env[1205]: time="2025-05-15T10:40:55.314067849Z" level=info msg="CreateContainer within sandbox \"ef5cd8d65679fe48eaee047bf67016aeb3566aacfaf71e4585f6faa08e236ce3\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"eb99138387e15e9fb43523322031b560570d5d56114270251e500d3a7485703e\"" May 15 10:40:55.314843 env[1205]: time="2025-05-15T10:40:55.314794073Z" level=info msg="StartContainer for \"eb99138387e15e9fb43523322031b560570d5d56114270251e500d3a7485703e\"" May 15 10:40:55.341124 systemd[1]: Started cri-containerd-eb99138387e15e9fb43523322031b560570d5d56114270251e500d3a7485703e.scope. May 15 10:40:55.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.352000 audit: BPF prog-id=190 op=LOAD May 15 10:40:55.354000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.354000 audit[4585]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4203 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:55.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562393931333833383765313565396662343335323333323230333162 May 15 10:40:55.363000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.363000 audit[4585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4203 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:55.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562393931333833383765313565396662343335323333323230333162 May 15 10:40:55.363000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.363000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.363000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.363000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.363000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.363000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.363000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.363000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.363000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.363000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.363000 audit: BPF prog-id=191 op=LOAD May 15 10:40:55.363000 audit[4585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002cbd10 items=0 ppid=4203 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:55.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562393931333833383765313565396662343335323333323230333162 May 15 10:40:55.364000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.364000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.364000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.364000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.364000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.364000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.364000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.364000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.364000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.364000 audit: BPF prog-id=192 op=LOAD May 15 10:40:55.364000 audit[4585]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002cbd58 items=0 ppid=4203 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:55.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562393931333833383765313565396662343335323333323230333162 May 15 10:40:55.373000 audit: BPF prog-id=192 op=UNLOAD May 15 10:40:55.373000 audit: BPF prog-id=191 op=UNLOAD May 15 10:40:55.373000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.373000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.373000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.373000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.373000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.373000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.373000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.373000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.373000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.373000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.373000 audit: BPF prog-id=193 op=LOAD May 15 10:40:55.373000 audit[4585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000338168 items=0 ppid=4203 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:55.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562393931333833383765313565396662343335323333323230333162 May 15 10:40:55.392173 systemd-networkd[1024]: cali0d65bffc108: Link UP May 15 10:40:55.394833 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:40:55.394902 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0d65bffc108: link becomes ready May 15 10:40:55.395036 systemd-networkd[1024]: cali0d65bffc108: Gained carrier May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.298 [INFO][4556] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--85fd7b7cb7--h2mp7-eth0 calico-apiserver-85fd7b7cb7- calico-apiserver fcb83224-37f0-4883-9e08-98a8f6194cef 1018 0 2025-05-15 10:40:10 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:85fd7b7cb7 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-85fd7b7cb7-h2mp7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0d65bffc108 [] []}} ContainerID="e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" Namespace="calico-apiserver" Pod="calico-apiserver-85fd7b7cb7-h2mp7" WorkloadEndpoint="localhost-k8s-calico--apiserver--85fd7b7cb7--h2mp7-" May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.298 [INFO][4556] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" Namespace="calico-apiserver" Pod="calico-apiserver-85fd7b7cb7-h2mp7" WorkloadEndpoint="localhost-k8s-calico--apiserver--85fd7b7cb7--h2mp7-eth0" May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.329 [INFO][4571] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" HandleID="k8s-pod-network.e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" Workload="localhost-k8s-calico--apiserver--85fd7b7cb7--h2mp7-eth0" May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.337 [INFO][4571] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" HandleID="k8s-pod-network.e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" Workload="localhost-k8s-calico--apiserver--85fd7b7cb7--h2mp7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000510fe0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-85fd7b7cb7-h2mp7", "timestamp":"2025-05-15 10:40:55.329420076 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.337 [INFO][4571] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.337 [INFO][4571] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.337 [INFO][4571] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.338 [INFO][4571] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" host="localhost" May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.341 [INFO][4571] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.344 [INFO][4571] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.346 [INFO][4571] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.349 [INFO][4571] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.349 [INFO][4571] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" host="localhost" May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.351 [INFO][4571] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1 May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.366 [INFO][4571] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" host="localhost" May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.378 [INFO][4571] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" host="localhost" May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.378 [INFO][4571] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" host="localhost" May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.378 [INFO][4571] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:55.413581 env[1205]: 2025-05-15 10:40:55.378 [INFO][4571] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" HandleID="k8s-pod-network.e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" Workload="localhost-k8s-calico--apiserver--85fd7b7cb7--h2mp7-eth0" May 15 10:40:55.414209 env[1205]: 2025-05-15 10:40:55.381 [INFO][4556] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" Namespace="calico-apiserver" Pod="calico-apiserver-85fd7b7cb7-h2mp7" WorkloadEndpoint="localhost-k8s-calico--apiserver--85fd7b7cb7--h2mp7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--85fd7b7cb7--h2mp7-eth0", GenerateName:"calico-apiserver-85fd7b7cb7-", Namespace:"calico-apiserver", SelfLink:"", UID:"fcb83224-37f0-4883-9e08-98a8f6194cef", ResourceVersion:"1018", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85fd7b7cb7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-85fd7b7cb7-h2mp7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0d65bffc108", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:55.414209 env[1205]: 2025-05-15 10:40:55.382 [INFO][4556] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" Namespace="calico-apiserver" Pod="calico-apiserver-85fd7b7cb7-h2mp7" WorkloadEndpoint="localhost-k8s-calico--apiserver--85fd7b7cb7--h2mp7-eth0" May 15 10:40:55.414209 env[1205]: 2025-05-15 10:40:55.382 [INFO][4556] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0d65bffc108 ContainerID="e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" Namespace="calico-apiserver" Pod="calico-apiserver-85fd7b7cb7-h2mp7" WorkloadEndpoint="localhost-k8s-calico--apiserver--85fd7b7cb7--h2mp7-eth0" May 15 10:40:55.414209 env[1205]: 2025-05-15 10:40:55.402 [INFO][4556] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" Namespace="calico-apiserver" Pod="calico-apiserver-85fd7b7cb7-h2mp7" WorkloadEndpoint="localhost-k8s-calico--apiserver--85fd7b7cb7--h2mp7-eth0" May 15 10:40:55.414209 env[1205]: 2025-05-15 10:40:55.402 [INFO][4556] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" Namespace="calico-apiserver" Pod="calico-apiserver-85fd7b7cb7-h2mp7" WorkloadEndpoint="localhost-k8s-calico--apiserver--85fd7b7cb7--h2mp7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--85fd7b7cb7--h2mp7-eth0", GenerateName:"calico-apiserver-85fd7b7cb7-", Namespace:"calico-apiserver", SelfLink:"", UID:"fcb83224-37f0-4883-9e08-98a8f6194cef", ResourceVersion:"1018", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85fd7b7cb7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1", Pod:"calico-apiserver-85fd7b7cb7-h2mp7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0d65bffc108", MAC:"8a:ce:d3:55:0c:3b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:55.414209 env[1205]: 2025-05-15 10:40:55.412 [INFO][4556] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1" Namespace="calico-apiserver" Pod="calico-apiserver-85fd7b7cb7-h2mp7" WorkloadEndpoint="localhost-k8s-calico--apiserver--85fd7b7cb7--h2mp7-eth0" May 15 10:40:55.415538 kubelet[2060]: E0515 10:40:55.415256 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:55.426000 audit[4616]: NETFILTER_CFG table=filter:112 family=2 entries=46 op=nft_register_chain pid=4616 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:40:55.426000 audit[4616]: SYSCALL arch=c000003e syscall=46 success=yes exit=23876 a0=3 a1=7fff8438fa70 a2=0 a3=7fff8438fa5c items=0 ppid=3717 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:55.426000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:40:55.434742 env[1205]: time="2025-05-15T10:40:55.434164090Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:40:55.434742 env[1205]: time="2025-05-15T10:40:55.434219596Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:40:55.434742 env[1205]: time="2025-05-15T10:40:55.434228723Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:40:55.434742 env[1205]: time="2025-05-15T10:40:55.434373920Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1 pid=4624 runtime=io.containerd.runc.v2 May 15 10:40:55.448235 systemd[1]: Started cri-containerd-e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1.scope. May 15 10:40:55.450400 env[1205]: time="2025-05-15T10:40:55.449002618Z" level=info msg="StartContainer for \"eb99138387e15e9fb43523322031b560570d5d56114270251e500d3a7485703e\" returns successfully" May 15 10:40:55.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit: BPF prog-id=194 op=LOAD May 15 10:40:55.460000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4624 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:55.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539616636356164373565326232653331363733396163306530303763 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4624 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:55.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539616636356164373565326232653331363733396163306530303763 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit: BPF prog-id=195 op=LOAD May 15 10:40:55.460000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00038a2f0 items=0 ppid=4624 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:55.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539616636356164373565326232653331363733396163306530303763 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit: BPF prog-id=196 op=LOAD May 15 10:40:55.460000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00038a338 items=0 ppid=4624 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:55.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539616636356164373565326232653331363733396163306530303763 May 15 10:40:55.460000 audit: BPF prog-id=196 op=UNLOAD May 15 10:40:55.460000 audit: BPF prog-id=195 op=UNLOAD May 15 10:40:55.460000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.460000 audit: BPF prog-id=197 op=LOAD May 15 10:40:55.460000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00038a748 items=0 ppid=4624 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:55.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539616636356164373565326232653331363733396163306530303763 May 15 10:40:55.462092 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:40:55.481398 env[1205]: time="2025-05-15T10:40:55.481360513Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85fd7b7cb7-h2mp7,Uid:fcb83224-37f0-4883-9e08-98a8f6194cef,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1\"" May 15 10:40:55.484301 env[1205]: time="2025-05-15T10:40:55.484262074Z" level=info msg="CreateContainer within sandbox \"e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:40:55.504425 env[1205]: time="2025-05-15T10:40:55.500720038Z" level=info msg="CreateContainer within sandbox \"e9af65ad75e2b2e316739ac0e007cc653024213ecfec526f7bd790411bf8f7c1\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0349f5df5c53969fd3a2e7e7661b191c85099e22a1528299eadb96b67e99b92c\"" May 15 10:40:55.504425 env[1205]: time="2025-05-15T10:40:55.503263114Z" level=info msg="StartContainer for \"0349f5df5c53969fd3a2e7e7661b191c85099e22a1528299eadb96b67e99b92c\"" May 15 10:40:55.518759 systemd[1]: Started cri-containerd-0349f5df5c53969fd3a2e7e7661b191c85099e22a1528299eadb96b67e99b92c.scope. May 15 10:40:55.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit: BPF prog-id=198 op=LOAD May 15 10:40:55.531000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4624 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:55.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033343966356466356335333936396664336132653765373636316231 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4624 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:55.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033343966356466356335333936396664336132653765373636316231 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit: BPF prog-id=199 op=LOAD May 15 10:40:55.531000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000416370 items=0 ppid=4624 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:55.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033343966356466356335333936396664336132653765373636316231 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.531000 audit: BPF prog-id=200 op=LOAD May 15 10:40:55.531000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0004163b8 items=0 ppid=4624 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:55.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033343966356466356335333936396664336132653765373636316231 May 15 10:40:55.531000 audit: BPF prog-id=200 op=UNLOAD May 15 10:40:55.532000 audit: BPF prog-id=199 op=UNLOAD May 15 10:40:55.532000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.532000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.532000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.532000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.532000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.532000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.532000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.532000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.532000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.532000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:55.532000 audit: BPF prog-id=201 op=LOAD May 15 10:40:55.532000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0004167c8 items=0 ppid=4624 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:55.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033343966356466356335333936396664336132653765373636316231 May 15 10:40:55.572560 env[1205]: time="2025-05-15T10:40:55.572519669Z" level=info msg="StartContainer for \"0349f5df5c53969fd3a2e7e7661b191c85099e22a1528299eadb96b67e99b92c\" returns successfully" May 15 10:40:56.126000 audit[4597]: AVC avc: denied { watch } for pid=4597 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_40_27.4225474728/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c250,c374 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c250,c374 tclass=file permissive=0 May 15 10:40:56.126000 audit[4597]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00048b960 a2=fc6 a3=0 items=0 ppid=4203 pid=4597 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c250,c374 key=(null) May 15 10:40:56.126000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:40:56.421171 kubelet[2060]: E0515 10:40:56.421121 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:56.430010 kubelet[2060]: I0515 10:40:56.429955 2060 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-85fd7b7cb7-h2mp7" podStartSLOduration=46.429937819 podStartE2EDuration="46.429937819s" podCreationTimestamp="2025-05-15 10:40:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:40:56.429359818 +0000 UTC m=+66.500582001" watchObservedRunningTime="2025-05-15 10:40:56.429937819 +0000 UTC m=+66.501160002" May 15 10:40:56.441485 kubelet[2060]: I0515 10:40:56.441431 2060 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-85fd7b7cb7-vgq28" podStartSLOduration=43.429395226 podStartE2EDuration="46.441414892s" podCreationTimestamp="2025-05-15 10:40:10 +0000 UTC" firstStartedPulling="2025-05-15 10:40:52.277088786 +0000 UTC m=+62.348310969" lastFinishedPulling="2025-05-15 10:40:55.289108442 +0000 UTC m=+65.360330635" observedRunningTime="2025-05-15 10:40:56.441107056 +0000 UTC m=+66.512329239" watchObservedRunningTime="2025-05-15 10:40:56.441414892 +0000 UTC m=+66.512637075" May 15 10:40:56.447000 audit[4711]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:56.447000 audit[4711]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcc81eb1d0 a2=0 a3=7ffcc81eb1bc items=0 ppid=2219 pid=4711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:56.447000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:56.454000 audit[4711]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:56.454000 audit[4711]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcc81eb1d0 a2=0 a3=7ffcc81eb1bc items=0 ppid=2219 pid=4711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:56.454000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:56.471000 audit[4713]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4713 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:56.471000 audit[4713]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe12cedab0 a2=0 a3=7ffe12ceda9c items=0 ppid=2219 pid=4713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:56.471000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:56.476000 audit[4713]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4713 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:56.476000 audit[4713]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe12cedab0 a2=0 a3=7ffe12ceda9c items=0 ppid=2219 pid=4713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:56.476000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:56.660923 systemd-networkd[1024]: cali0d65bffc108: Gained IPv6LL May 15 10:40:56.660000 audit[4690]: AVC avc: denied { watch } for pid=4690 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_40_27.1903969128/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c880 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c154,c880 tclass=file permissive=0 May 15 10:40:56.660000 audit[4690]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b82060 a2=fc6 a3=0 items=0 ppid=4624 pid=4690 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c880 key=(null) May 15 10:40:56.660000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:40:57.422285 kubelet[2060]: I0515 10:40:57.422250 2060 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:40:57.426021 env[1205]: time="2025-05-15T10:40:57.425977972Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:57.428080 env[1205]: time="2025-05-15T10:40:57.428023196Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:57.429952 env[1205]: time="2025-05-15T10:40:57.429886945Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:57.431440 env[1205]: time="2025-05-15T10:40:57.431394295Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:57.431778 env[1205]: time="2025-05-15T10:40:57.431742729Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 10:40:57.434069 env[1205]: time="2025-05-15T10:40:57.434029433Z" level=info msg="CreateContainer within sandbox \"40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 10:40:57.448105 env[1205]: time="2025-05-15T10:40:57.448051213Z" level=info msg="CreateContainer within sandbox \"40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"597ac5ef65e06b91f91996fdb9e7fb4cddf521e7581595495dce008e4d241039\"" May 15 10:40:57.448540 env[1205]: time="2025-05-15T10:40:57.448516428Z" level=info msg="StartContainer for \"597ac5ef65e06b91f91996fdb9e7fb4cddf521e7581595495dce008e4d241039\"" May 15 10:40:57.468920 systemd[1]: Started cri-containerd-597ac5ef65e06b91f91996fdb9e7fb4cddf521e7581595495dce008e4d241039.scope. May 15 10:40:57.483000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6686680578 items=0 ppid=4420 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:57.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376163356566363565303662393166393139393666646239653766 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit: BPF prog-id=202 op=LOAD May 15 10:40:57.483000 audit[4741]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002a4958 items=0 ppid=4420 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:57.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376163356566363565303662393166393139393666646239653766 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit: BPF prog-id=203 op=LOAD May 15 10:40:57.483000 audit[4741]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002a49a8 items=0 ppid=4420 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:57.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376163356566363565303662393166393139393666646239653766 May 15 10:40:57.483000 audit: BPF prog-id=203 op=UNLOAD May 15 10:40:57.483000 audit: BPF prog-id=202 op=UNLOAD May 15 10:40:57.483000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:57.483000 audit: BPF prog-id=204 op=LOAD May 15 10:40:57.483000 audit[4741]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002a4a38 items=0 ppid=4420 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:57.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376163356566363565303662393166393139393666646239653766 May 15 10:40:57.489000 audit[4760]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:57.489000 audit[4760]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffda540a0a0 a2=0 a3=7ffda540a08c items=0 ppid=2219 pid=4760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:57.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:57.495000 audit[4760]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:57.495000 audit[4760]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffda540a0a0 a2=0 a3=7ffda540a08c items=0 ppid=2219 pid=4760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:57.495000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:57.517456 env[1205]: time="2025-05-15T10:40:57.517396718Z" level=info msg="StartContainer for \"597ac5ef65e06b91f91996fdb9e7fb4cddf521e7581595495dce008e4d241039\" returns successfully" May 15 10:40:57.518780 env[1205]: time="2025-05-15T10:40:57.518733714Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 10:40:59.624758 env[1205]: time="2025-05-15T10:40:59.624704097Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:59.632163 env[1205]: time="2025-05-15T10:40:59.632104347Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:59.633860 env[1205]: time="2025-05-15T10:40:59.633822366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:59.636277 env[1205]: time="2025-05-15T10:40:59.636239315Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:59.636572 env[1205]: time="2025-05-15T10:40:59.636531181Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 10:40:59.638958 env[1205]: time="2025-05-15T10:40:59.638928953Z" level=info msg="CreateContainer within sandbox \"40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 10:40:59.652225 env[1205]: time="2025-05-15T10:40:59.652154597Z" level=info msg="CreateContainer within sandbox \"40840374c859ed8a2c5ac8f64e953ad3d2de31ebf1b4f3345598980d357012de\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"34b89cece37ad465ca3912e399e7b971b34f4ff0fd48d975493977026f5972a2\"" May 15 10:40:59.652894 env[1205]: time="2025-05-15T10:40:59.652868044Z" level=info msg="StartContainer for \"34b89cece37ad465ca3912e399e7b971b34f4ff0fd48d975493977026f5972a2\"" May 15 10:40:59.666103 systemd[1]: Started sshd@17-10.0.0.58:22-10.0.0.1:58628.service. May 15 10:40:59.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.58:22-10.0.0.1:58628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:59.672384 kernel: kauditd_printk_skb: 254 callbacks suppressed May 15 10:40:59.672442 kernel: audit: type=1130 audit(1747305659.666:1422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.58:22-10.0.0.1:58628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:59.677631 systemd[1]: Started cri-containerd-34b89cece37ad465ca3912e399e7b971b34f4ff0fd48d975493977026f5972a2.scope. May 15 10:40:59.693000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.709588 kernel: audit: type=1400 audit(1747305659.693:1423): avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.709748 kernel: audit: type=1300 audit(1747305659.693:1423): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1c90541688 items=0 ppid=4420 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:59.709773 kernel: audit: type=1327 audit(1747305659.693:1423): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623839636563653337616434363563613339313265333939653762 May 15 10:40:59.709793 kernel: audit: type=1400 audit(1747305659.695:1424): avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.693000 audit[4796]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1c90541688 items=0 ppid=4420 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:59.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623839636563653337616434363563613339313265333939653762 May 15 10:40:59.695000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.710096 sshd[4803]: Accepted publickey for core from 10.0.0.1 port 58628 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:59.710186 sshd[4803]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:59.695000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.714690 kernel: audit: type=1400 audit(1747305659.695:1424): avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.695000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.716468 systemd-logind[1195]: New session 18 of user core. May 15 10:40:59.716789 systemd[1]: Started session-18.scope. May 15 10:40:59.718685 kernel: audit: type=1400 audit(1747305659.695:1424): avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.695000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.728454 kernel: audit: type=1400 audit(1747305659.695:1424): avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.728532 kernel: audit: type=1400 audit(1747305659.695:1424): avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.695000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.695000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.733712 kernel: audit: type=1400 audit(1747305659.695:1424): avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.695000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.695000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.695000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.695000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.695000 audit: BPF prog-id=205 op=LOAD May 15 10:40:59.695000 audit[4796]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000293548 items=0 ppid=4420 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:59.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623839636563653337616434363563613339313265333939653762 May 15 10:40:59.696000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.696000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.696000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.696000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.696000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.696000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.696000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.696000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.705000 audit[4803]: USER_ACCT pid=4803 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:59.696000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.696000 audit: BPF prog-id=206 op=LOAD May 15 10:40:59.696000 audit[4796]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000293598 items=0 ppid=4420 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:59.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623839636563653337616434363563613339313265333939653762 May 15 10:40:59.705000 audit: BPF prog-id=206 op=UNLOAD May 15 10:40:59.705000 audit: BPF prog-id=205 op=UNLOAD May 15 10:40:59.705000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.705000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.705000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.705000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.705000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.705000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.705000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.705000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.705000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.709000 audit[4803]: CRED_ACQ pid=4803 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:59.709000 audit[4803]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc904a6510 a2=3 a3=0 items=0 ppid=1 pid=4803 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:59.709000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:59.705000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:59.705000 audit: BPF prog-id=207 op=LOAD May 15 10:40:59.705000 audit[4796]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000293628 items=0 ppid=4420 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:59.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623839636563653337616434363563613339313265333939653762 May 15 10:40:59.721000 audit[4803]: USER_START pid=4803 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:59.723000 audit[4818]: CRED_ACQ pid=4818 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:59.746786 env[1205]: time="2025-05-15T10:40:59.746735607Z" level=info msg="StartContainer for \"34b89cece37ad465ca3912e399e7b971b34f4ff0fd48d975493977026f5972a2\" returns successfully" May 15 10:40:59.834188 sshd[4803]: pam_unix(sshd:session): session closed for user core May 15 10:40:59.834000 audit[4803]: USER_END pid=4803 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:59.834000 audit[4803]: CRED_DISP pid=4803 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:59.837281 systemd[1]: sshd@17-10.0.0.58:22-10.0.0.1:58628.service: Deactivated successfully. May 15 10:40:59.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.58:22-10.0.0.1:58628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:59.837813 systemd[1]: session-18.scope: Deactivated successfully. May 15 10:40:59.838292 systemd-logind[1195]: Session 18 logged out. Waiting for processes to exit. May 15 10:40:59.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.58:22-10.0.0.1:58642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:59.839347 systemd[1]: Started sshd@18-10.0.0.58:22-10.0.0.1:58642.service. May 15 10:40:59.840329 systemd-logind[1195]: Removed session 18. May 15 10:40:59.869000 audit[4841]: USER_ACCT pid=4841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:59.870088 sshd[4841]: Accepted publickey for core from 10.0.0.1 port 58642 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:59.869000 audit[4841]: CRED_ACQ pid=4841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:59.869000 audit[4841]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffea7aff40 a2=3 a3=0 items=0 ppid=1 pid=4841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:59.869000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:59.870883 sshd[4841]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:59.874291 systemd-logind[1195]: New session 19 of user core. May 15 10:40:59.875075 systemd[1]: Started session-19.scope. May 15 10:40:59.878000 audit[4841]: USER_START pid=4841 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:59.879000 audit[4843]: CRED_ACQ pid=4843 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:00.104364 kubelet[2060]: I0515 10:41:00.104094 2060 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 10:41:00.104364 kubelet[2060]: I0515 10:41:00.104127 2060 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 10:41:00.163084 sshd[4841]: pam_unix(sshd:session): session closed for user core May 15 10:41:00.164000 audit[4841]: USER_END pid=4841 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:00.164000 audit[4841]: CRED_DISP pid=4841 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:00.165564 systemd[1]: Started sshd@19-10.0.0.58:22-10.0.0.1:58648.service. May 15 10:41:00.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.58:22-10.0.0.1:58648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:00.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.58:22-10.0.0.1:58642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:00.168357 systemd[1]: sshd@18-10.0.0.58:22-10.0.0.1:58642.service: Deactivated successfully. May 15 10:41:00.169449 systemd[1]: session-19.scope: Deactivated successfully. May 15 10:41:00.170650 systemd-logind[1195]: Session 19 logged out. Waiting for processes to exit. May 15 10:41:00.171515 systemd-logind[1195]: Removed session 19. May 15 10:41:00.200000 audit[4851]: USER_ACCT pid=4851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:00.201250 sshd[4851]: Accepted publickey for core from 10.0.0.1 port 58648 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:41:00.201000 audit[4851]: CRED_ACQ pid=4851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:00.201000 audit[4851]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde1494650 a2=3 a3=0 items=0 ppid=1 pid=4851 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:00.201000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:41:00.202037 sshd[4851]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:41:00.205226 systemd-logind[1195]: New session 20 of user core. May 15 10:41:00.205966 systemd[1]: Started session-20.scope. May 15 10:41:00.208000 audit[4851]: USER_START pid=4851 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:00.210000 audit[4856]: CRED_ACQ pid=4856 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:00.444147 kubelet[2060]: I0515 10:41:00.444009 2060 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-6mxq2" podStartSLOduration=44.372380479 podStartE2EDuration="50.443989238s" podCreationTimestamp="2025-05-15 10:40:10 +0000 UTC" firstStartedPulling="2025-05-15 10:40:53.565739777 +0000 UTC m=+63.636961960" lastFinishedPulling="2025-05-15 10:40:59.637348536 +0000 UTC m=+69.708570719" observedRunningTime="2025-05-15 10:41:00.44376433 +0000 UTC m=+70.514986523" watchObservedRunningTime="2025-05-15 10:41:00.443989238 +0000 UTC m=+70.515211421" May 15 10:41:01.737000 audit[4870]: NETFILTER_CFG table=filter:119 family=2 entries=20 op=nft_register_rule pid=4870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:41:01.737000 audit[4870]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe20cdebe0 a2=0 a3=7ffe20cdebcc items=0 ppid=2219 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:01.737000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:41:01.742000 audit[4870]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=4870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:41:01.742000 audit[4870]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe20cdebe0 a2=0 a3=0 items=0 ppid=2219 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:01.742000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:41:01.747212 sshd[4851]: pam_unix(sshd:session): session closed for user core May 15 10:41:01.748000 audit[4851]: USER_END pid=4851 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:01.748000 audit[4851]: CRED_DISP pid=4851 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:01.750593 systemd[1]: sshd@19-10.0.0.58:22-10.0.0.1:58648.service: Deactivated successfully. May 15 10:41:01.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.58:22-10.0.0.1:58648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:01.751134 systemd[1]: session-20.scope: Deactivated successfully. May 15 10:41:01.751845 systemd-logind[1195]: Session 20 logged out. Waiting for processes to exit. May 15 10:41:01.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.58:22-10.0.0.1:58658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:01.752950 systemd[1]: Started sshd@20-10.0.0.58:22-10.0.0.1:58658.service. May 15 10:41:01.754068 systemd-logind[1195]: Removed session 20. May 15 10:41:01.756000 audit[4875]: NETFILTER_CFG table=filter:121 family=2 entries=32 op=nft_register_rule pid=4875 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:41:01.756000 audit[4875]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd8d7fb600 a2=0 a3=7ffd8d7fb5ec items=0 ppid=2219 pid=4875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:01.756000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:41:01.762000 audit[4875]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=4875 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:41:01.762000 audit[4875]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd8d7fb600 a2=0 a3=0 items=0 ppid=2219 pid=4875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:01.762000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:41:01.784271 sshd[4874]: Accepted publickey for core from 10.0.0.1 port 58658 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:41:01.783000 audit[4874]: USER_ACCT pid=4874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:01.784000 audit[4874]: CRED_ACQ pid=4874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:01.784000 audit[4874]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2503e290 a2=3 a3=0 items=0 ppid=1 pid=4874 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:01.784000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:41:01.785755 sshd[4874]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:41:01.791030 systemd[1]: Started session-21.scope. May 15 10:41:01.791301 systemd-logind[1195]: New session 21 of user core. May 15 10:41:01.795000 audit[4874]: USER_START pid=4874 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:01.796000 audit[4877]: CRED_ACQ pid=4877 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:02.058079 sshd[4874]: pam_unix(sshd:session): session closed for user core May 15 10:41:02.059000 audit[4874]: USER_END pid=4874 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:02.059000 audit[4874]: CRED_DISP pid=4874 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:02.062521 systemd[1]: Started sshd@21-10.0.0.58:22-10.0.0.1:58662.service. May 15 10:41:02.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.58:22-10.0.0.1:58662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:02.063314 systemd[1]: sshd@20-10.0.0.58:22-10.0.0.1:58658.service: Deactivated successfully. May 15 10:41:02.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.58:22-10.0.0.1:58658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:02.063863 systemd[1]: session-21.scope: Deactivated successfully. May 15 10:41:02.064800 systemd-logind[1195]: Session 21 logged out. Waiting for processes to exit. May 15 10:41:02.065811 systemd-logind[1195]: Removed session 21. May 15 10:41:02.094000 audit[4885]: USER_ACCT pid=4885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:02.095582 sshd[4885]: Accepted publickey for core from 10.0.0.1 port 58662 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:41:02.095000 audit[4885]: CRED_ACQ pid=4885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:02.095000 audit[4885]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce4937c50 a2=3 a3=0 items=0 ppid=1 pid=4885 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:02.095000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:41:02.096641 sshd[4885]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:41:02.100447 systemd-logind[1195]: New session 22 of user core. May 15 10:41:02.101228 systemd[1]: Started session-22.scope. May 15 10:41:02.104000 audit[4885]: USER_START pid=4885 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:02.105000 audit[4888]: CRED_ACQ pid=4888 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:02.215614 sshd[4885]: pam_unix(sshd:session): session closed for user core May 15 10:41:02.215000 audit[4885]: USER_END pid=4885 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:02.216000 audit[4885]: CRED_DISP pid=4885 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:02.218114 systemd[1]: sshd@21-10.0.0.58:22-10.0.0.1:58662.service: Deactivated successfully. May 15 10:41:02.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.58:22-10.0.0.1:58662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:02.218874 systemd[1]: session-22.scope: Deactivated successfully. May 15 10:41:02.219442 systemd-logind[1195]: Session 22 logged out. Waiting for processes to exit. May 15 10:41:02.220157 systemd-logind[1195]: Removed session 22. May 15 10:41:04.201851 kubelet[2060]: E0515 10:41:04.201784 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:41:07.220141 systemd[1]: Started sshd@22-10.0.0.58:22-10.0.0.1:46426.service. May 15 10:41:07.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.58:22-10.0.0.1:46426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:07.221160 kernel: kauditd_printk_skb: 100 callbacks suppressed May 15 10:41:07.221205 kernel: audit: type=1130 audit(1747305667.219:1477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.58:22-10.0.0.1:46426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:07.253000 audit[4932]: USER_ACCT pid=4932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:07.254035 sshd[4932]: Accepted publickey for core from 10.0.0.1 port 46426 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:41:07.257000 audit[4932]: CRED_ACQ pid=4932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:07.258200 sshd[4932]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:41:07.261519 kernel: audit: type=1101 audit(1747305667.253:1478): pid=4932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:07.261634 kernel: audit: type=1103 audit(1747305667.257:1479): pid=4932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:07.261672 kernel: audit: type=1006 audit(1747305667.257:1480): pid=4932 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 15 10:41:07.262371 systemd[1]: Started session-23.scope. May 15 10:41:07.263489 systemd-logind[1195]: New session 23 of user core. May 15 10:41:07.263824 kernel: audit: type=1300 audit(1747305667.257:1480): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe581361a0 a2=3 a3=0 items=0 ppid=1 pid=4932 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:07.257000 audit[4932]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe581361a0 a2=3 a3=0 items=0 ppid=1 pid=4932 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:07.257000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:41:07.269030 kernel: audit: type=1327 audit(1747305667.257:1480): proctitle=737368643A20636F7265205B707269765D May 15 10:41:07.269121 kernel: audit: type=1105 audit(1747305667.266:1481): pid=4932 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:07.266000 audit[4932]: USER_START pid=4932 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:07.268000 audit[4934]: CRED_ACQ pid=4934 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:07.276741 kernel: audit: type=1103 audit(1747305667.268:1482): pid=4934 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:07.384935 sshd[4932]: pam_unix(sshd:session): session closed for user core May 15 10:41:07.385000 audit[4932]: USER_END pid=4932 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:07.387357 systemd[1]: sshd@22-10.0.0.58:22-10.0.0.1:46426.service: Deactivated successfully. May 15 10:41:07.388285 systemd[1]: session-23.scope: Deactivated successfully. May 15 10:41:07.389160 systemd-logind[1195]: Session 23 logged out. Waiting for processes to exit. May 15 10:41:07.389963 systemd-logind[1195]: Removed session 23. May 15 10:41:07.385000 audit[4932]: CRED_DISP pid=4932 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:07.393597 kernel: audit: type=1106 audit(1747305667.385:1483): pid=4932 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:07.393671 kernel: audit: type=1104 audit(1747305667.385:1484): pid=4932 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:07.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.58:22-10.0.0.1:46426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:07.651000 audit[4945]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=4945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:41:07.651000 audit[4945]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcf34a95f0 a2=0 a3=7ffcf34a95dc items=0 ppid=2219 pid=4945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:07.651000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:41:07.657000 audit[4945]: NETFILTER_CFG table=nat:124 family=2 entries=106 op=nft_register_chain pid=4945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:41:07.657000 audit[4945]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcf34a95f0 a2=0 a3=7ffcf34a95dc items=0 ppid=2219 pid=4945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:07.657000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:41:09.030619 kubelet[2060]: E0515 10:41:09.030580 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:41:10.947390 kubelet[2060]: I0515 10:41:10.947326 2060 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:41:10.981000 audit[4953]: NETFILTER_CFG table=filter:125 family=2 entries=8 op=nft_register_rule pid=4953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:41:10.981000 audit[4953]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc4f1f73b0 a2=0 a3=7ffc4f1f739c items=0 ppid=2219 pid=4953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:10.981000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:41:10.987000 audit[4953]: NETFILTER_CFG table=nat:126 family=2 entries=58 op=nft_register_chain pid=4953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:41:10.987000 audit[4953]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffc4f1f73b0 a2=0 a3=7ffc4f1f739c items=0 ppid=2219 pid=4953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:10.987000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:41:11.030432 kubelet[2060]: E0515 10:41:11.030395 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:41:12.389603 systemd[1]: Started sshd@23-10.0.0.58:22-10.0.0.1:46440.service. May 15 10:41:12.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.58:22-10.0.0.1:46440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.390866 kernel: kauditd_printk_skb: 13 callbacks suppressed May 15 10:41:12.391080 kernel: audit: type=1130 audit(1747305672.389:1490): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.58:22-10.0.0.1:46440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.419000 audit[4955]: USER_ACCT pid=4955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:12.420344 sshd[4955]: Accepted publickey for core from 10.0.0.1 port 46440 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:41:12.424697 kernel: audit: type=1101 audit(1747305672.419:1491): pid=4955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:12.425131 kernel: audit: type=1103 audit(1747305672.424:1492): pid=4955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:12.424000 audit[4955]: CRED_ACQ pid=4955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:12.425012 sshd[4955]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:41:12.429975 systemd-logind[1195]: New session 24 of user core. May 15 10:41:12.430420 systemd[1]: Started session-24.scope. May 15 10:41:12.431444 kernel: audit: type=1006 audit(1747305672.424:1493): pid=4955 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 15 10:41:12.431504 kernel: audit: type=1300 audit(1747305672.424:1493): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff303f2b50 a2=3 a3=0 items=0 ppid=1 pid=4955 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:12.424000 audit[4955]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff303f2b50 a2=3 a3=0 items=0 ppid=1 pid=4955 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:12.437357 kernel: audit: type=1327 audit(1747305672.424:1493): proctitle=737368643A20636F7265205B707269765D May 15 10:41:12.424000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:41:12.434000 audit[4955]: USER_START pid=4955 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:12.442064 kernel: audit: type=1105 audit(1747305672.434:1494): pid=4955 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:12.442121 kernel: audit: type=1103 audit(1747305672.435:1495): pid=4957 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:12.435000 audit[4957]: CRED_ACQ pid=4957 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:12.533370 sshd[4955]: pam_unix(sshd:session): session closed for user core May 15 10:41:12.533000 audit[4955]: USER_END pid=4955 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:12.538000 audit[4955]: CRED_DISP pid=4955 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:12.543013 kernel: audit: type=1106 audit(1747305672.533:1496): pid=4955 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:12.543096 kernel: audit: type=1104 audit(1747305672.538:1497): pid=4955 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:12.543606 systemd-logind[1195]: Session 24 logged out. Waiting for processes to exit. May 15 10:41:12.543754 systemd[1]: sshd@23-10.0.0.58:22-10.0.0.1:46440.service: Deactivated successfully. May 15 10:41:12.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.58:22-10.0.0.1:46440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.544379 systemd[1]: session-24.scope: Deactivated successfully. May 15 10:41:12.545172 systemd-logind[1195]: Removed session 24. May 15 10:41:14.030754 kubelet[2060]: E0515 10:41:14.030700 2060 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:41:17.538198 systemd[1]: Started sshd@24-10.0.0.58:22-10.0.0.1:34838.service. May 15 10:41:17.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.58:22-10.0.0.1:34838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.539273 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:41:17.539331 kernel: audit: type=1130 audit(1747305677.536:1499): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.58:22-10.0.0.1:34838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.568000 audit[4970]: USER_ACCT pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:17.570864 sshd[4970]: Accepted publickey for core from 10.0.0.1 port 34838 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:41:17.573000 audit[4970]: CRED_ACQ pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:17.575290 sshd[4970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:41:17.579045 kernel: audit: type=1101 audit(1747305677.568:1500): pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:17.579091 kernel: audit: type=1103 audit(1747305677.573:1501): pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:17.579127 kernel: audit: type=1006 audit(1747305677.573:1502): pid=4970 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 15 10:41:17.579702 systemd[1]: Started session-25.scope. May 15 10:41:17.580014 systemd-logind[1195]: New session 25 of user core. May 15 10:41:17.580838 kernel: audit: type=1300 audit(1747305677.573:1502): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1aaf37a0 a2=3 a3=0 items=0 ppid=1 pid=4970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:17.573000 audit[4970]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1aaf37a0 a2=3 a3=0 items=0 ppid=1 pid=4970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:17.573000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:41:17.586077 kernel: audit: type=1327 audit(1747305677.573:1502): proctitle=737368643A20636F7265205B707269765D May 15 10:41:17.586139 kernel: audit: type=1105 audit(1747305677.583:1503): pid=4970 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:17.583000 audit[4970]: USER_START pid=4970 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:17.584000 audit[4972]: CRED_ACQ pid=4972 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:17.593644 kernel: audit: type=1103 audit(1747305677.584:1504): pid=4972 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:17.684920 sshd[4970]: pam_unix(sshd:session): session closed for user core May 15 10:41:17.684000 audit[4970]: USER_END pid=4970 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:17.687355 systemd[1]: sshd@24-10.0.0.58:22-10.0.0.1:34838.service: Deactivated successfully. May 15 10:41:17.688054 systemd[1]: session-25.scope: Deactivated successfully. May 15 10:41:17.688544 systemd-logind[1195]: Session 25 logged out. Waiting for processes to exit. May 15 10:41:17.689168 systemd-logind[1195]: Removed session 25. May 15 10:41:17.684000 audit[4970]: CRED_DISP pid=4970 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:17.693580 kernel: audit: type=1106 audit(1747305677.684:1505): pid=4970 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:17.693634 kernel: audit: type=1104 audit(1747305677.684:1506): pid=4970 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:17.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.58:22-10.0.0.1:34838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.690040 systemd[1]: Started sshd@25-10.0.0.58:22-10.0.0.1:34842.service. May 15 10:41:22.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.58:22-10.0.0.1:34842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.691284 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:41:22.691417 kernel: audit: type=1130 audit(1747305682.688:1508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.58:22-10.0.0.1:34842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.721000 audit[4986]: USER_ACCT pid=4986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:22.723165 sshd[4986]: Accepted publickey for core from 10.0.0.1 port 34842 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:41:22.724533 sshd[4986]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:41:22.722000 audit[4986]: CRED_ACQ pid=4986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:22.728719 systemd-logind[1195]: New session 26 of user core. May 15 10:41:22.729827 systemd[1]: Started session-26.scope. May 15 10:41:22.730399 kernel: audit: type=1101 audit(1747305682.721:1509): pid=4986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:22.730483 kernel: audit: type=1103 audit(1747305682.722:1510): pid=4986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:22.730511 kernel: audit: type=1006 audit(1747305682.722:1511): pid=4986 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 15 10:41:22.732693 kernel: audit: type=1300 audit(1747305682.722:1511): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2ad089b0 a2=3 a3=0 items=0 ppid=1 pid=4986 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:22.722000 audit[4986]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2ad089b0 a2=3 a3=0 items=0 ppid=1 pid=4986 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:22.736601 kernel: audit: type=1327 audit(1747305682.722:1511): proctitle=737368643A20636F7265205B707269765D May 15 10:41:22.722000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:41:22.737939 kernel: audit: type=1105 audit(1747305682.733:1512): pid=4986 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:22.733000 audit[4986]: USER_START pid=4986 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:22.742124 kernel: audit: type=1103 audit(1747305682.734:1513): pid=4988 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:22.734000 audit[4988]: CRED_ACQ pid=4988 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:22.840184 sshd[4986]: pam_unix(sshd:session): session closed for user core May 15 10:41:22.839000 audit[4986]: USER_END pid=4986 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:22.842773 systemd[1]: sshd@25-10.0.0.58:22-10.0.0.1:34842.service: Deactivated successfully. May 15 10:41:22.843648 systemd[1]: session-26.scope: Deactivated successfully. May 15 10:41:22.844452 systemd-logind[1195]: Session 26 logged out. Waiting for processes to exit. May 15 10:41:22.845265 systemd-logind[1195]: Removed session 26. May 15 10:41:22.839000 audit[4986]: CRED_DISP pid=4986 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:22.848873 kernel: audit: type=1106 audit(1747305682.839:1514): pid=4986 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:22.848939 kernel: audit: type=1104 audit(1747305682.839:1515): pid=4986 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:41:22.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.58:22-10.0.0.1:34842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'