May 15 10:04:02.721968 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 15 10:04:02.721989 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Thu May 15 09:09:56 -00 2025 May 15 10:04:02.721997 kernel: efi: EFI v2.70 by EDK II May 15 10:04:02.722003 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 15 10:04:02.722008 kernel: random: crng init done May 15 10:04:02.722013 kernel: ACPI: Early table checksum verification disabled May 15 10:04:02.722020 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 15 10:04:02.722043 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 15 10:04:02.722049 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:04:02.722055 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:04:02.722060 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:04:02.722066 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:04:02.722071 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:04:02.722077 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:04:02.722085 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:04:02.722091 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:04:02.722097 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:04:02.722103 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 15 10:04:02.722109 kernel: NUMA: Failed to initialise from firmware May 15 10:04:02.722115 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 15 10:04:02.722121 kernel: NUMA: NODE_DATA [mem 0xdcb08900-0xdcb0dfff] May 15 10:04:02.722127 kernel: Zone ranges: May 15 10:04:02.722132 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 15 10:04:02.722139 kernel: DMA32 empty May 15 10:04:02.722145 kernel: Normal empty May 15 10:04:02.722151 kernel: Movable zone start for each node May 15 10:04:02.722157 kernel: Early memory node ranges May 15 10:04:02.722162 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 15 10:04:02.722168 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 15 10:04:02.722174 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 15 10:04:02.722180 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 15 10:04:02.722185 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 15 10:04:02.722191 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 15 10:04:02.722197 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 15 10:04:02.722203 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 15 10:04:02.722210 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 15 10:04:02.722215 kernel: psci: probing for conduit method from ACPI. May 15 10:04:02.722221 kernel: psci: PSCIv1.1 detected in firmware. May 15 10:04:02.722227 kernel: psci: Using standard PSCI v0.2 function IDs May 15 10:04:02.722233 kernel: psci: Trusted OS migration not required May 15 10:04:02.722241 kernel: psci: SMC Calling Convention v1.1 May 15 10:04:02.722247 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 15 10:04:02.722262 kernel: ACPI: SRAT not present May 15 10:04:02.722269 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 15 10:04:02.722275 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 15 10:04:02.722282 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 15 10:04:02.722288 kernel: Detected PIPT I-cache on CPU0 May 15 10:04:02.722294 kernel: CPU features: detected: GIC system register CPU interface May 15 10:04:02.722300 kernel: CPU features: detected: Hardware dirty bit management May 15 10:04:02.722306 kernel: CPU features: detected: Spectre-v4 May 15 10:04:02.722312 kernel: CPU features: detected: Spectre-BHB May 15 10:04:02.722320 kernel: CPU features: kernel page table isolation forced ON by KASLR May 15 10:04:02.722326 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 15 10:04:02.722332 kernel: CPU features: detected: ARM erratum 1418040 May 15 10:04:02.722338 kernel: CPU features: detected: SSBS not fully self-synchronizing May 15 10:04:02.722345 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 15 10:04:02.722351 kernel: Policy zone: DMA May 15 10:04:02.722358 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=aa29d2e9841b6b978238db9eff73afa5af149616ae25608914babb265d82dda7 May 15 10:04:02.722364 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 10:04:02.722371 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 10:04:02.722377 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 10:04:02.722383 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 10:04:02.722391 kernel: Memory: 2457392K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36416K init, 777K bss, 114896K reserved, 0K cma-reserved) May 15 10:04:02.722397 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 15 10:04:02.722404 kernel: trace event string verifier disabled May 15 10:04:02.722410 kernel: rcu: Preemptible hierarchical RCU implementation. May 15 10:04:02.722416 kernel: rcu: RCU event tracing is enabled. May 15 10:04:02.722423 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 15 10:04:02.722429 kernel: Trampoline variant of Tasks RCU enabled. May 15 10:04:02.722436 kernel: Tracing variant of Tasks RCU enabled. May 15 10:04:02.722442 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 10:04:02.722448 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 15 10:04:02.722454 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 15 10:04:02.722462 kernel: GICv3: 256 SPIs implemented May 15 10:04:02.722468 kernel: GICv3: 0 Extended SPIs implemented May 15 10:04:02.722474 kernel: GICv3: Distributor has no Range Selector support May 15 10:04:02.722480 kernel: Root IRQ handler: gic_handle_irq May 15 10:04:02.722486 kernel: GICv3: 16 PPIs implemented May 15 10:04:02.722492 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 15 10:04:02.722498 kernel: ACPI: SRAT not present May 15 10:04:02.722505 kernel: ITS [mem 0x08080000-0x0809ffff] May 15 10:04:02.722511 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 15 10:04:02.722517 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 15 10:04:02.722523 kernel: GICv3: using LPI property table @0x00000000400d0000 May 15 10:04:02.722530 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 15 10:04:02.722537 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:04:02.722543 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 15 10:04:02.722550 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 15 10:04:02.722556 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 15 10:04:02.722562 kernel: arm-pv: using stolen time PV May 15 10:04:02.722569 kernel: Console: colour dummy device 80x25 May 15 10:04:02.722575 kernel: ACPI: Core revision 20210730 May 15 10:04:02.722582 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 15 10:04:02.722588 kernel: pid_max: default: 32768 minimum: 301 May 15 10:04:02.722594 kernel: LSM: Security Framework initializing May 15 10:04:02.722602 kernel: SELinux: Initializing. May 15 10:04:02.722608 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:04:02.722615 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:04:02.722621 kernel: ACPI PPTT: PPTT table found, but unable to locate core 3 (3) May 15 10:04:02.722627 kernel: rcu: Hierarchical SRCU implementation. May 15 10:04:02.722634 kernel: Platform MSI: ITS@0x8080000 domain created May 15 10:04:02.722640 kernel: PCI/MSI: ITS@0x8080000 domain created May 15 10:04:02.722646 kernel: Remapping and enabling EFI services. May 15 10:04:02.722653 kernel: smp: Bringing up secondary CPUs ... May 15 10:04:02.722660 kernel: Detected PIPT I-cache on CPU1 May 15 10:04:02.722667 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 15 10:04:02.722673 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 15 10:04:02.722680 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:04:02.722686 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 15 10:04:02.722692 kernel: Detected PIPT I-cache on CPU2 May 15 10:04:02.722699 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 15 10:04:02.722705 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 15 10:04:02.722712 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:04:02.722718 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 15 10:04:02.722725 kernel: Detected PIPT I-cache on CPU3 May 15 10:04:02.722732 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 15 10:04:02.722738 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 15 10:04:02.722745 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:04:02.722755 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 15 10:04:02.722763 kernel: smp: Brought up 1 node, 4 CPUs May 15 10:04:02.722770 kernel: SMP: Total of 4 processors activated. May 15 10:04:02.722777 kernel: CPU features: detected: 32-bit EL0 Support May 15 10:04:02.722783 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 15 10:04:02.722790 kernel: CPU features: detected: Common not Private translations May 15 10:04:02.722796 kernel: CPU features: detected: CRC32 instructions May 15 10:04:02.722803 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 15 10:04:02.722811 kernel: CPU features: detected: LSE atomic instructions May 15 10:04:02.722818 kernel: CPU features: detected: Privileged Access Never May 15 10:04:02.722824 kernel: CPU features: detected: RAS Extension Support May 15 10:04:02.722831 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 15 10:04:02.722838 kernel: CPU: All CPU(s) started at EL1 May 15 10:04:02.722846 kernel: alternatives: patching kernel code May 15 10:04:02.722852 kernel: devtmpfs: initialized May 15 10:04:02.722859 kernel: KASLR enabled May 15 10:04:02.722866 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 10:04:02.722879 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 15 10:04:02.722886 kernel: pinctrl core: initialized pinctrl subsystem May 15 10:04:02.722893 kernel: SMBIOS 3.0.0 present. May 15 10:04:02.722900 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 15 10:04:02.722906 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 10:04:02.722915 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 15 10:04:02.722922 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 15 10:04:02.722929 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 15 10:04:02.722936 kernel: audit: initializing netlink subsys (disabled) May 15 10:04:02.722944 kernel: audit: type=2000 audit(0.037:1): state=initialized audit_enabled=0 res=1 May 15 10:04:02.722951 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 10:04:02.722958 kernel: cpuidle: using governor menu May 15 10:04:02.722965 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 15 10:04:02.722971 kernel: ASID allocator initialised with 32768 entries May 15 10:04:02.722979 kernel: ACPI: bus type PCI registered May 15 10:04:02.722986 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 10:04:02.722993 kernel: Serial: AMBA PL011 UART driver May 15 10:04:02.723000 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 10:04:02.723006 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 15 10:04:02.723013 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 10:04:02.723020 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 15 10:04:02.723026 kernel: cryptd: max_cpu_qlen set to 1000 May 15 10:04:02.723033 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 15 10:04:02.723041 kernel: ACPI: Added _OSI(Module Device) May 15 10:04:02.723048 kernel: ACPI: Added _OSI(Processor Device) May 15 10:04:02.723055 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 10:04:02.723063 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 10:04:02.723070 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 10:04:02.723077 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 10:04:02.723084 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 10:04:02.723090 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 10:04:02.723097 kernel: ACPI: Interpreter enabled May 15 10:04:02.723105 kernel: ACPI: Using GIC for interrupt routing May 15 10:04:02.723111 kernel: ACPI: MCFG table detected, 1 entries May 15 10:04:02.723151 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 15 10:04:02.723162 kernel: printk: console [ttyAMA0] enabled May 15 10:04:02.723170 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 10:04:02.723327 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 10:04:02.723395 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 15 10:04:02.723457 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 15 10:04:02.723515 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 15 10:04:02.723599 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 15 10:04:02.723610 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 15 10:04:02.723617 kernel: PCI host bridge to bus 0000:00 May 15 10:04:02.723687 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 15 10:04:02.723746 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 15 10:04:02.723799 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 15 10:04:02.723856 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 10:04:02.723941 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 15 10:04:02.724013 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 15 10:04:02.724074 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 15 10:04:02.724135 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 15 10:04:02.724193 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 15 10:04:02.724254 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 15 10:04:02.724365 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 15 10:04:02.724423 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 15 10:04:02.724475 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 15 10:04:02.724526 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 15 10:04:02.724578 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 15 10:04:02.724587 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 15 10:04:02.724594 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 15 10:04:02.724604 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 15 10:04:02.724611 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 15 10:04:02.724617 kernel: iommu: Default domain type: Translated May 15 10:04:02.724625 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 15 10:04:02.724631 kernel: vgaarb: loaded May 15 10:04:02.724637 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 10:04:02.724644 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 10:04:02.724651 kernel: PTP clock support registered May 15 10:04:02.724657 kernel: Registered efivars operations May 15 10:04:02.724665 kernel: clocksource: Switched to clocksource arch_sys_counter May 15 10:04:02.724672 kernel: VFS: Disk quotas dquot_6.6.0 May 15 10:04:02.724679 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 10:04:02.724685 kernel: pnp: PnP ACPI init May 15 10:04:02.724750 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 15 10:04:02.724759 kernel: pnp: PnP ACPI: found 1 devices May 15 10:04:02.724766 kernel: NET: Registered PF_INET protocol family May 15 10:04:02.724773 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 10:04:02.724781 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 10:04:02.724788 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 10:04:02.724794 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 10:04:02.724801 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 10:04:02.724807 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 10:04:02.724814 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:04:02.724821 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:04:02.724827 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 10:04:02.724834 kernel: PCI: CLS 0 bytes, default 64 May 15 10:04:02.724841 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 15 10:04:02.724848 kernel: kvm [1]: HYP mode not available May 15 10:04:02.724854 kernel: Initialise system trusted keyrings May 15 10:04:02.724861 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 10:04:02.724867 kernel: Key type asymmetric registered May 15 10:04:02.724881 kernel: Asymmetric key parser 'x509' registered May 15 10:04:02.724888 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 10:04:02.724894 kernel: io scheduler mq-deadline registered May 15 10:04:02.724901 kernel: io scheduler kyber registered May 15 10:04:02.724910 kernel: io scheduler bfq registered May 15 10:04:02.724916 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 15 10:04:02.724923 kernel: ACPI: button: Power Button [PWRB] May 15 10:04:02.724930 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 15 10:04:02.724997 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 15 10:04:02.725006 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 10:04:02.725012 kernel: thunder_xcv, ver 1.0 May 15 10:04:02.725019 kernel: thunder_bgx, ver 1.0 May 15 10:04:02.725025 kernel: nicpf, ver 1.0 May 15 10:04:02.725033 kernel: nicvf, ver 1.0 May 15 10:04:02.725106 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 15 10:04:02.725161 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-15T10:04:02 UTC (1747303442) May 15 10:04:02.725170 kernel: hid: raw HID events driver (C) Jiri Kosina May 15 10:04:02.725177 kernel: NET: Registered PF_INET6 protocol family May 15 10:04:02.725184 kernel: Segment Routing with IPv6 May 15 10:04:02.725190 kernel: In-situ OAM (IOAM) with IPv6 May 15 10:04:02.725197 kernel: NET: Registered PF_PACKET protocol family May 15 10:04:02.725205 kernel: Key type dns_resolver registered May 15 10:04:02.725211 kernel: registered taskstats version 1 May 15 10:04:02.725218 kernel: Loading compiled-in X.509 certificates May 15 10:04:02.725225 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 3679cbfb4d4756a2ddc177f0eaedea33fb5fdf2e' May 15 10:04:02.725231 kernel: Key type .fscrypt registered May 15 10:04:02.725238 kernel: Key type fscrypt-provisioning registered May 15 10:04:02.725244 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 10:04:02.725251 kernel: ima: Allocated hash algorithm: sha1 May 15 10:04:02.725268 kernel: ima: No architecture policies found May 15 10:04:02.725276 kernel: clk: Disabling unused clocks May 15 10:04:02.725282 kernel: Freeing unused kernel memory: 36416K May 15 10:04:02.725289 kernel: Run /init as init process May 15 10:04:02.725295 kernel: with arguments: May 15 10:04:02.725302 kernel: /init May 15 10:04:02.725308 kernel: with environment: May 15 10:04:02.725315 kernel: HOME=/ May 15 10:04:02.725321 kernel: TERM=linux May 15 10:04:02.725327 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 10:04:02.725337 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:04:02.725346 systemd[1]: Detected virtualization kvm. May 15 10:04:02.725356 systemd[1]: Detected architecture arm64. May 15 10:04:02.725363 systemd[1]: Running in initrd. May 15 10:04:02.725370 systemd[1]: No hostname configured, using default hostname. May 15 10:04:02.725377 systemd[1]: Hostname set to . May 15 10:04:02.725384 systemd[1]: Initializing machine ID from VM UUID. May 15 10:04:02.725393 systemd[1]: Queued start job for default target initrd.target. May 15 10:04:02.725400 systemd[1]: Started systemd-ask-password-console.path. May 15 10:04:02.725407 systemd[1]: Reached target cryptsetup.target. May 15 10:04:02.725413 systemd[1]: Reached target paths.target. May 15 10:04:02.725420 systemd[1]: Reached target slices.target. May 15 10:04:02.725427 systemd[1]: Reached target swap.target. May 15 10:04:02.725434 systemd[1]: Reached target timers.target. May 15 10:04:02.725441 systemd[1]: Listening on iscsid.socket. May 15 10:04:02.725450 systemd[1]: Listening on iscsiuio.socket. May 15 10:04:02.725457 systemd[1]: Listening on systemd-journald-audit.socket. May 15 10:04:02.725464 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 10:04:02.725472 systemd[1]: Listening on systemd-journald.socket. May 15 10:04:02.725481 systemd[1]: Listening on systemd-networkd.socket. May 15 10:04:02.725489 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:04:02.725497 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:04:02.725504 systemd[1]: Reached target sockets.target. May 15 10:04:02.725513 systemd[1]: Starting kmod-static-nodes.service... May 15 10:04:02.725520 systemd[1]: Finished network-cleanup.service. May 15 10:04:02.725529 systemd[1]: Starting systemd-fsck-usr.service... May 15 10:04:02.725536 systemd[1]: Starting systemd-journald.service... May 15 10:04:02.725543 systemd[1]: Starting systemd-modules-load.service... May 15 10:04:02.725550 systemd[1]: Starting systemd-resolved.service... May 15 10:04:02.725557 systemd[1]: Starting systemd-vconsole-setup.service... May 15 10:04:02.725566 systemd[1]: Finished kmod-static-nodes.service. May 15 10:04:02.725573 systemd[1]: Finished systemd-fsck-usr.service. May 15 10:04:02.725583 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:04:02.725590 systemd[1]: Finished systemd-vconsole-setup.service. May 15 10:04:02.725597 kernel: audit: type=1130 audit(1747303442.723:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:02.725609 systemd-journald[290]: Journal started May 15 10:04:02.725659 systemd-journald[290]: Runtime Journal (/run/log/journal/0677caddf7664d95a4202426f856a87d) is 6.0M, max 48.7M, 42.6M free. May 15 10:04:02.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:02.719047 systemd-modules-load[291]: Inserted module 'overlay' May 15 10:04:02.727149 systemd[1]: Started systemd-journald.service. May 15 10:04:02.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:02.732541 kernel: audit: type=1130 audit(1747303442.727:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:02.730739 systemd[1]: Starting dracut-cmdline-ask.service... May 15 10:04:02.733560 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:04:02.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:02.739276 kernel: audit: type=1130 audit(1747303442.734:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:02.744275 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 10:04:02.747643 systemd[1]: Finished dracut-cmdline-ask.service. May 15 10:04:02.751223 kernel: Bridge firewalling registered May 15 10:04:02.751242 kernel: audit: type=1130 audit(1747303442.748:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:02.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:02.748555 systemd-resolved[292]: Positive Trust Anchors: May 15 10:04:02.748562 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:04:02.748589 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:04:02.748923 systemd-modules-load[291]: Inserted module 'br_netfilter' May 15 10:04:02.762680 kernel: audit: type=1130 audit(1747303442.759:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:02.762702 kernel: SCSI subsystem initialized May 15 10:04:02.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:02.751990 systemd[1]: Starting dracut-cmdline.service... May 15 10:04:02.752774 systemd-resolved[292]: Defaulting to hostname 'linux'. May 15 10:04:02.755279 systemd[1]: Started systemd-resolved.service. May 15 10:04:02.765117 dracut-cmdline[307]: dracut-dracut-053 May 15 10:04:02.760599 systemd[1]: Reached target nss-lookup.target. May 15 10:04:02.766380 dracut-cmdline[307]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=aa29d2e9841b6b978238db9eff73afa5af149616ae25608914babb265d82dda7 May 15 10:04:02.771509 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 10:04:02.771552 kernel: device-mapper: uevent: version 1.0.3 May 15 10:04:02.772340 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 10:04:02.775004 systemd-modules-load[291]: Inserted module 'dm_multipath' May 15 10:04:02.775844 systemd[1]: Finished systemd-modules-load.service. May 15 10:04:02.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:02.777727 systemd[1]: Starting systemd-sysctl.service... May 15 10:04:02.780769 kernel: audit: type=1130 audit(1747303442.776:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:02.785621 systemd[1]: Finished systemd-sysctl.service. May 15 10:04:02.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:02.789616 kernel: audit: type=1130 audit(1747303442.785:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:02.833285 kernel: Loading iSCSI transport class v2.0-870. May 15 10:04:02.845286 kernel: iscsi: registered transport (tcp) May 15 10:04:02.859342 kernel: iscsi: registered transport (qla4xxx) May 15 10:04:02.859366 kernel: QLogic iSCSI HBA Driver May 15 10:04:02.893142 systemd[1]: Finished dracut-cmdline.service. May 15 10:04:02.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:02.894697 systemd[1]: Starting dracut-pre-udev.service... May 15 10:04:02.897010 kernel: audit: type=1130 audit(1747303442.893:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:02.937293 kernel: raid6: neonx8 gen() 9525 MB/s May 15 10:04:02.954273 kernel: raid6: neonx8 xor() 10444 MB/s May 15 10:04:02.971268 kernel: raid6: neonx4 gen() 13381 MB/s May 15 10:04:02.988270 kernel: raid6: neonx4 xor() 10808 MB/s May 15 10:04:03.005270 kernel: raid6: neonx2 gen() 12900 MB/s May 15 10:04:03.022298 kernel: raid6: neonx2 xor() 9572 MB/s May 15 10:04:03.039269 kernel: raid6: neonx1 gen() 10533 MB/s May 15 10:04:03.056279 kernel: raid6: neonx1 xor() 8791 MB/s May 15 10:04:03.073279 kernel: raid6: int64x8 gen() 6266 MB/s May 15 10:04:03.090278 kernel: raid6: int64x8 xor() 3541 MB/s May 15 10:04:03.107278 kernel: raid6: int64x4 gen() 7209 MB/s May 15 10:04:03.124278 kernel: raid6: int64x4 xor() 3857 MB/s May 15 10:04:03.141279 kernel: raid6: int64x2 gen() 6152 MB/s May 15 10:04:03.158278 kernel: raid6: int64x2 xor() 3320 MB/s May 15 10:04:03.175278 kernel: raid6: int64x1 gen() 5043 MB/s May 15 10:04:03.192486 kernel: raid6: int64x1 xor() 2646 MB/s May 15 10:04:03.192508 kernel: raid6: using algorithm neonx4 gen() 13381 MB/s May 15 10:04:03.192525 kernel: raid6: .... xor() 10808 MB/s, rmw enabled May 15 10:04:03.192541 kernel: raid6: using neon recovery algorithm May 15 10:04:03.203623 kernel: xor: measuring software checksum speed May 15 10:04:03.203646 kernel: 8regs : 17181 MB/sec May 15 10:04:03.203667 kernel: 32regs : 20733 MB/sec May 15 10:04:03.204557 kernel: arm64_neon : 27804 MB/sec May 15 10:04:03.204568 kernel: xor: using function: arm64_neon (27804 MB/sec) May 15 10:04:03.260279 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 15 10:04:03.269347 systemd[1]: Finished dracut-pre-udev.service. May 15 10:04:03.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:03.272291 kernel: audit: type=1130 audit(1747303443.269:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:03.271000 audit: BPF prog-id=7 op=LOAD May 15 10:04:03.271000 audit: BPF prog-id=8 op=LOAD May 15 10:04:03.272592 systemd[1]: Starting systemd-udevd.service... May 15 10:04:03.284990 systemd-udevd[490]: Using default interface naming scheme 'v252'. May 15 10:04:03.288308 systemd[1]: Started systemd-udevd.service. May 15 10:04:03.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:03.289695 systemd[1]: Starting dracut-pre-trigger.service... May 15 10:04:03.301166 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation May 15 10:04:03.325857 systemd[1]: Finished dracut-pre-trigger.service. May 15 10:04:03.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:03.327195 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:04:03.359629 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:04:03.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:03.386934 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 15 10:04:03.390864 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 10:04:03.390889 kernel: GPT:9289727 != 19775487 May 15 10:04:03.390898 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 10:04:03.390912 kernel: GPT:9289727 != 19775487 May 15 10:04:03.390920 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 10:04:03.390928 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:04:03.405841 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 10:04:03.409294 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (537) May 15 10:04:03.411357 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 10:04:03.412066 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 10:04:03.420151 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 10:04:03.423245 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:04:03.424605 systemd[1]: Starting disk-uuid.service... May 15 10:04:03.430375 disk-uuid[561]: Primary Header is updated. May 15 10:04:03.430375 disk-uuid[561]: Secondary Entries is updated. May 15 10:04:03.430375 disk-uuid[561]: Secondary Header is updated. May 15 10:04:03.434279 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:04:04.443927 disk-uuid[562]: The operation has completed successfully. May 15 10:04:04.444819 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:04:04.468233 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 10:04:04.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:04.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:04.468402 systemd[1]: Finished disk-uuid.service. May 15 10:04:04.472388 systemd[1]: Starting verity-setup.service... May 15 10:04:04.493288 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 15 10:04:04.516454 systemd[1]: Found device dev-mapper-usr.device. May 15 10:04:04.517905 systemd[1]: Mounting sysusr-usr.mount... May 15 10:04:04.518622 systemd[1]: Finished verity-setup.service. May 15 10:04:04.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:04.569273 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 10:04:04.569445 systemd[1]: Mounted sysusr-usr.mount. May 15 10:04:04.570160 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 10:04:04.570937 systemd[1]: Starting ignition-setup.service... May 15 10:04:04.573145 systemd[1]: Starting parse-ip-for-networkd.service... May 15 10:04:04.579764 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 15 10:04:04.579835 kernel: BTRFS info (device vda6): using free space tree May 15 10:04:04.579892 kernel: BTRFS info (device vda6): has skinny extents May 15 10:04:04.587055 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 10:04:04.592822 systemd[1]: Finished ignition-setup.service. May 15 10:04:04.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:04.594312 systemd[1]: Starting ignition-fetch-offline.service... May 15 10:04:04.655725 systemd[1]: Finished parse-ip-for-networkd.service. May 15 10:04:04.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:04.656000 audit: BPF prog-id=9 op=LOAD May 15 10:04:04.657763 systemd[1]: Starting systemd-networkd.service... May 15 10:04:04.673547 ignition[645]: Ignition 2.14.0 May 15 10:04:04.674312 ignition[645]: Stage: fetch-offline May 15 10:04:04.674374 ignition[645]: no configs at "/usr/lib/ignition/base.d" May 15 10:04:04.674385 ignition[645]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:04:04.674518 ignition[645]: parsed url from cmdline: "" May 15 10:04:04.674522 ignition[645]: no config URL provided May 15 10:04:04.674526 ignition[645]: reading system config file "/usr/lib/ignition/user.ign" May 15 10:04:04.674533 ignition[645]: no config at "/usr/lib/ignition/user.ign" May 15 10:04:04.674553 ignition[645]: op(1): [started] loading QEMU firmware config module May 15 10:04:04.674559 ignition[645]: op(1): executing: "modprobe" "qemu_fw_cfg" May 15 10:04:04.679845 ignition[645]: op(1): [finished] loading QEMU firmware config module May 15 10:04:04.680516 systemd-networkd[738]: lo: Link UP May 15 10:04:04.680520 systemd-networkd[738]: lo: Gained carrier May 15 10:04:04.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:04.680864 systemd-networkd[738]: Enumeration completed May 15 10:04:04.680968 systemd[1]: Started systemd-networkd.service. May 15 10:04:04.681029 systemd-networkd[738]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:04:04.681935 systemd-networkd[738]: eth0: Link UP May 15 10:04:04.681939 systemd-networkd[738]: eth0: Gained carrier May 15 10:04:04.682401 systemd[1]: Reached target network.target. May 15 10:04:04.685086 systemd[1]: Starting iscsiuio.service... May 15 10:04:04.694014 systemd[1]: Started iscsiuio.service. May 15 10:04:04.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:04.695443 systemd[1]: Starting iscsid.service... May 15 10:04:04.698709 iscsid[744]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 10:04:04.698709 iscsid[744]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 10:04:04.698709 iscsid[744]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 10:04:04.698709 iscsid[744]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 10:04:04.698709 iscsid[744]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 10:04:04.698709 iscsid[744]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 10:04:04.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:04.701542 systemd[1]: Started iscsid.service. May 15 10:04:04.707781 systemd[1]: Starting dracut-initqueue.service... May 15 10:04:04.709351 systemd-networkd[738]: eth0: DHCPv4 address 10.0.0.18/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:04:04.718131 systemd[1]: Finished dracut-initqueue.service. May 15 10:04:04.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:04.719226 systemd[1]: Reached target remote-fs-pre.target. May 15 10:04:04.720779 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:04:04.722455 systemd[1]: Reached target remote-fs.target. May 15 10:04:04.724943 systemd[1]: Starting dracut-pre-mount.service... May 15 10:04:04.732581 systemd[1]: Finished dracut-pre-mount.service. May 15 10:04:04.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:04.749345 ignition[645]: parsing config with SHA512: f703fbb120a96a639a04b53bca5a6ac5bc60160511beaea9def15587024985d50593ce4e6dbee03ea7c526d99c2a505069b8ddc9e40b6b52800ef3d0aa04b3b9 May 15 10:04:04.757039 unknown[645]: fetched base config from "system" May 15 10:04:04.757050 unknown[645]: fetched user config from "qemu" May 15 10:04:04.757482 ignition[645]: fetch-offline: fetch-offline passed May 15 10:04:04.759036 systemd[1]: Finished ignition-fetch-offline.service. May 15 10:04:04.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:04.757537 ignition[645]: Ignition finished successfully May 15 10:04:04.760558 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 10:04:04.761376 systemd[1]: Starting ignition-kargs.service... May 15 10:04:04.769739 ignition[760]: Ignition 2.14.0 May 15 10:04:04.769748 ignition[760]: Stage: kargs May 15 10:04:04.769837 ignition[760]: no configs at "/usr/lib/ignition/base.d" May 15 10:04:04.771664 systemd[1]: Finished ignition-kargs.service. May 15 10:04:04.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:04.769846 ignition[760]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:04:04.770730 ignition[760]: kargs: kargs passed May 15 10:04:04.773720 systemd[1]: Starting ignition-disks.service... May 15 10:04:04.770768 ignition[760]: Ignition finished successfully May 15 10:04:04.779591 ignition[766]: Ignition 2.14.0 May 15 10:04:04.779601 ignition[766]: Stage: disks May 15 10:04:04.779690 ignition[766]: no configs at "/usr/lib/ignition/base.d" May 15 10:04:04.779700 ignition[766]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:04:04.781404 systemd[1]: Finished ignition-disks.service. May 15 10:04:04.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:04.780556 ignition[766]: disks: disks passed May 15 10:04:04.782775 systemd[1]: Reached target initrd-root-device.target. May 15 10:04:04.780596 ignition[766]: Ignition finished successfully May 15 10:04:04.783974 systemd[1]: Reached target local-fs-pre.target. May 15 10:04:04.784939 systemd[1]: Reached target local-fs.target. May 15 10:04:04.786096 systemd[1]: Reached target sysinit.target. May 15 10:04:04.787199 systemd[1]: Reached target basic.target. May 15 10:04:04.789136 systemd[1]: Starting systemd-fsck-root.service... May 15 10:04:04.799695 systemd-fsck[774]: ROOT: clean, 623/553520 files, 56022/553472 blocks May 15 10:04:04.802583 systemd[1]: Finished systemd-fsck-root.service. May 15 10:04:04.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:04.805118 systemd[1]: Mounting sysroot.mount... May 15 10:04:04.812084 systemd[1]: Mounted sysroot.mount. May 15 10:04:04.813059 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 10:04:04.812735 systemd[1]: Reached target initrd-root-fs.target. May 15 10:04:04.816248 systemd[1]: Mounting sysroot-usr.mount... May 15 10:04:04.817046 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 10:04:04.817086 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 10:04:04.817110 systemd[1]: Reached target ignition-diskful.target. May 15 10:04:04.819116 systemd[1]: Mounted sysroot-usr.mount. May 15 10:04:04.821587 systemd[1]: Starting initrd-setup-root.service... May 15 10:04:04.826236 initrd-setup-root[784]: cut: /sysroot/etc/passwd: No such file or directory May 15 10:04:04.829895 initrd-setup-root[792]: cut: /sysroot/etc/group: No such file or directory May 15 10:04:04.833977 initrd-setup-root[800]: cut: /sysroot/etc/shadow: No such file or directory May 15 10:04:04.837995 initrd-setup-root[808]: cut: /sysroot/etc/gshadow: No such file or directory May 15 10:04:04.863818 systemd[1]: Finished initrd-setup-root.service. May 15 10:04:04.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:04.865229 systemd[1]: Starting ignition-mount.service... May 15 10:04:04.866355 systemd[1]: Starting sysroot-boot.service... May 15 10:04:04.871183 bash[825]: umount: /sysroot/usr/share/oem: not mounted. May 15 10:04:04.879525 ignition[827]: INFO : Ignition 2.14.0 May 15 10:04:04.880329 ignition[827]: INFO : Stage: mount May 15 10:04:04.880827 ignition[827]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:04:04.880827 ignition[827]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:04:04.882350 ignition[827]: INFO : mount: mount passed May 15 10:04:04.882350 ignition[827]: INFO : Ignition finished successfully May 15 10:04:04.883575 systemd[1]: Finished ignition-mount.service. May 15 10:04:04.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:04.888681 systemd[1]: Finished sysroot-boot.service. May 15 10:04:04.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:05.528054 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 10:04:05.534888 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (835) May 15 10:04:05.534934 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 15 10:04:05.534944 kernel: BTRFS info (device vda6): using free space tree May 15 10:04:05.535361 kernel: BTRFS info (device vda6): has skinny extents May 15 10:04:05.538635 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 10:04:05.540222 systemd[1]: Starting ignition-files.service... May 15 10:04:05.554364 ignition[855]: INFO : Ignition 2.14.0 May 15 10:04:05.554364 ignition[855]: INFO : Stage: files May 15 10:04:05.555691 ignition[855]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:04:05.555691 ignition[855]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:04:05.555691 ignition[855]: DEBUG : files: compiled without relabeling support, skipping May 15 10:04:05.559509 ignition[855]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 10:04:05.559509 ignition[855]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 10:04:05.564297 ignition[855]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 10:04:05.565302 ignition[855]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 10:04:05.566445 unknown[855]: wrote ssh authorized keys file for user: core May 15 10:04:05.567424 ignition[855]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 10:04:05.567424 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 15 10:04:05.567424 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 May 15 10:04:05.635715 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 15 10:04:05.754191 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 15 10:04:05.755793 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 15 10:04:05.755793 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 15 10:04:05.755793 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 15 10:04:05.755793 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 15 10:04:05.755793 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:04:05.755793 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:04:05.755793 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:04:05.755793 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:04:05.755793 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:04:05.767727 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:04:05.767727 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" May 15 10:04:05.767727 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" May 15 10:04:05.767727 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" May 15 10:04:05.767727 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-arm64.raw: attempt #1 May 15 10:04:06.100378 systemd-networkd[738]: eth0: Gained IPv6LL May 15 10:04:06.126429 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 15 10:04:06.325648 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" May 15 10:04:06.325648 ignition[855]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 15 10:04:06.329570 ignition[855]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:04:06.329570 ignition[855]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:04:06.329570 ignition[855]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 15 10:04:06.329570 ignition[855]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 15 10:04:06.329570 ignition[855]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:04:06.329570 ignition[855]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:04:06.329570 ignition[855]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 15 10:04:06.329570 ignition[855]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 15 10:04:06.329570 ignition[855]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 15 10:04:06.329570 ignition[855]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 15 10:04:06.329570 ignition[855]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:04:06.370207 ignition[855]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:04:06.371874 ignition[855]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 15 10:04:06.371874 ignition[855]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 10:04:06.371874 ignition[855]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 10:04:06.371874 ignition[855]: INFO : files: files passed May 15 10:04:06.371874 ignition[855]: INFO : Ignition finished successfully May 15 10:04:06.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.372644 systemd[1]: Finished ignition-files.service. May 15 10:04:06.377181 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 10:04:06.390335 initrd-setup-root-after-ignition[878]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 15 10:04:06.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.387109 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 10:04:06.394011 initrd-setup-root-after-ignition[881]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 10:04:06.388127 systemd[1]: Starting ignition-quench.service... May 15 10:04:06.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.389858 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 10:04:06.391175 systemd[1]: Reached target ignition-complete.target. May 15 10:04:06.393427 systemd[1]: Starting initrd-parse-etc.service... May 15 10:04:06.394836 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 10:04:06.395136 systemd[1]: Finished ignition-quench.service. May 15 10:04:06.406536 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 10:04:06.406642 systemd[1]: Finished initrd-parse-etc.service. May 15 10:04:06.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.408013 systemd[1]: Reached target initrd-fs.target. May 15 10:04:06.408901 systemd[1]: Reached target initrd.target. May 15 10:04:06.409941 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 10:04:06.410757 systemd[1]: Starting dracut-pre-pivot.service... May 15 10:04:06.422028 systemd[1]: Finished dracut-pre-pivot.service. May 15 10:04:06.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.423558 systemd[1]: Starting initrd-cleanup.service... May 15 10:04:06.431752 systemd[1]: Stopped target nss-lookup.target. May 15 10:04:06.432433 systemd[1]: Stopped target remote-cryptsetup.target. May 15 10:04:06.433550 systemd[1]: Stopped target timers.target. May 15 10:04:06.434533 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 10:04:06.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.434640 systemd[1]: Stopped dracut-pre-pivot.service. May 15 10:04:06.435581 systemd[1]: Stopped target initrd.target. May 15 10:04:06.436554 systemd[1]: Stopped target basic.target. May 15 10:04:06.437567 systemd[1]: Stopped target ignition-complete.target. May 15 10:04:06.438578 systemd[1]: Stopped target ignition-diskful.target. May 15 10:04:06.439547 systemd[1]: Stopped target initrd-root-device.target. May 15 10:04:06.440625 systemd[1]: Stopped target remote-fs.target. May 15 10:04:06.441658 systemd[1]: Stopped target remote-fs-pre.target. May 15 10:04:06.442714 systemd[1]: Stopped target sysinit.target. May 15 10:04:06.443676 systemd[1]: Stopped target local-fs.target. May 15 10:04:06.444753 systemd[1]: Stopped target local-fs-pre.target. May 15 10:04:06.445729 systemd[1]: Stopped target swap.target. May 15 10:04:06.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.446632 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 10:04:06.446746 systemd[1]: Stopped dracut-pre-mount.service. May 15 10:04:06.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.447831 systemd[1]: Stopped target cryptsetup.target. May 15 10:04:06.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.448655 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 10:04:06.448750 systemd[1]: Stopped dracut-initqueue.service. May 15 10:04:06.449859 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 10:04:06.449961 systemd[1]: Stopped ignition-fetch-offline.service. May 15 10:04:06.451007 systemd[1]: Stopped target paths.target. May 15 10:04:06.451898 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 10:04:06.455340 systemd[1]: Stopped systemd-ask-password-console.path. May 15 10:04:06.456269 systemd[1]: Stopped target slices.target. May 15 10:04:06.457378 systemd[1]: Stopped target sockets.target. May 15 10:04:06.458319 systemd[1]: iscsid.socket: Deactivated successfully. May 15 10:04:06.458396 systemd[1]: Closed iscsid.socket. May 15 10:04:06.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.459316 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 10:04:06.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.459432 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 10:04:06.460434 systemd[1]: ignition-files.service: Deactivated successfully. May 15 10:04:06.460523 systemd[1]: Stopped ignition-files.service. May 15 10:04:06.462233 systemd[1]: Stopping ignition-mount.service... May 15 10:04:06.463332 systemd[1]: Stopping iscsiuio.service... May 15 10:04:06.464951 systemd[1]: Stopping sysroot-boot.service... May 15 10:04:06.466589 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 10:04:06.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.469554 ignition[895]: INFO : Ignition 2.14.0 May 15 10:04:06.469554 ignition[895]: INFO : Stage: umount May 15 10:04:06.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.466737 systemd[1]: Stopped systemd-udev-trigger.service. May 15 10:04:06.472999 ignition[895]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:04:06.472999 ignition[895]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:04:06.472999 ignition[895]: INFO : umount: umount passed May 15 10:04:06.472999 ignition[895]: INFO : Ignition finished successfully May 15 10:04:06.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.467781 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 10:04:06.467878 systemd[1]: Stopped dracut-pre-trigger.service. May 15 10:04:06.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.470250 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 10:04:06.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.470358 systemd[1]: Stopped iscsiuio.service. May 15 10:04:06.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.471387 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 10:04:06.471453 systemd[1]: Closed iscsiuio.socket. May 15 10:04:06.472347 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 10:04:06.472430 systemd[1]: Finished initrd-cleanup.service. May 15 10:04:06.473840 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 10:04:06.473927 systemd[1]: Stopped ignition-mount.service. May 15 10:04:06.476707 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 10:04:06.476984 systemd[1]: Stopped target network.target. May 15 10:04:06.478100 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 10:04:06.478150 systemd[1]: Stopped ignition-disks.service. May 15 10:04:06.479652 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 10:04:06.479691 systemd[1]: Stopped ignition-kargs.service. May 15 10:04:06.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.481053 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 10:04:06.481093 systemd[1]: Stopped ignition-setup.service. May 15 10:04:06.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.482543 systemd[1]: Stopping systemd-networkd.service... May 15 10:04:06.483679 systemd[1]: Stopping systemd-resolved.service... May 15 10:04:06.493289 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 10:04:06.493325 systemd-networkd[738]: eth0: DHCPv6 lease lost May 15 10:04:06.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.493395 systemd[1]: Stopped systemd-resolved.service. May 15 10:04:06.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.495777 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 10:04:06.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.495877 systemd[1]: Stopped systemd-networkd.service. May 15 10:04:06.507000 audit: BPF prog-id=6 op=UNLOAD May 15 10:04:06.507000 audit: BPF prog-id=9 op=UNLOAD May 15 10:04:06.497284 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 10:04:06.497315 systemd[1]: Closed systemd-networkd.socket. May 15 10:04:06.499062 systemd[1]: Stopping network-cleanup.service... May 15 10:04:06.500295 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 10:04:06.500354 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 10:04:06.502166 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 10:04:06.502212 systemd[1]: Stopped systemd-sysctl.service. May 15 10:04:06.504006 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 10:04:06.504050 systemd[1]: Stopped systemd-modules-load.service. May 15 10:04:06.507155 systemd[1]: Stopping systemd-udevd.service... May 15 10:04:06.509428 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 10:04:06.513133 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 10:04:06.513233 systemd[1]: Stopped network-cleanup.service. May 15 10:04:06.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.514456 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 10:04:06.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.514563 systemd[1]: Stopped systemd-udevd.service. May 15 10:04:06.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.515594 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 10:04:06.515630 systemd[1]: Closed systemd-udevd-control.socket. May 15 10:04:06.516495 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 10:04:06.516522 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 10:04:06.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.517658 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 10:04:06.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.517702 systemd[1]: Stopped dracut-pre-udev.service. May 15 10:04:06.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.519803 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 10:04:06.519841 systemd[1]: Stopped dracut-cmdline.service. May 15 10:04:06.520887 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 10:04:06.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.520925 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 10:04:06.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.522917 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 10:04:06.524140 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 15 10:04:06.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.524195 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 15 10:04:06.526238 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 10:04:06.526294 systemd[1]: Stopped kmod-static-nodes.service. May 15 10:04:06.527684 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 10:04:06.527724 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 10:04:06.530052 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 15 10:04:06.530611 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 10:04:06.530700 systemd[1]: Stopped sysroot-boot.service. May 15 10:04:06.532021 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 10:04:06.532100 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 10:04:06.533493 systemd[1]: Reached target initrd-switch-root.target. May 15 10:04:06.534716 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 10:04:06.534775 systemd[1]: Stopped initrd-setup-root.service. May 15 10:04:06.536978 systemd[1]: Starting initrd-switch-root.service... May 15 10:04:06.545589 systemd[1]: Switching root. May 15 10:04:06.563882 iscsid[744]: iscsid shutting down. May 15 10:04:06.564466 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). May 15 10:04:06.564516 systemd-journald[290]: Journal stopped May 15 10:04:08.671742 kernel: SELinux: Class mctp_socket not defined in policy. May 15 10:04:08.671804 kernel: SELinux: Class anon_inode not defined in policy. May 15 10:04:08.671816 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 10:04:08.671829 kernel: SELinux: policy capability network_peer_controls=1 May 15 10:04:08.671839 kernel: SELinux: policy capability open_perms=1 May 15 10:04:08.671851 kernel: SELinux: policy capability extended_socket_class=1 May 15 10:04:08.671868 kernel: SELinux: policy capability always_check_network=0 May 15 10:04:08.671882 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 10:04:08.671894 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 10:04:08.671904 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 10:04:08.671918 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 10:04:08.671930 systemd[1]: Successfully loaded SELinux policy in 33.827ms. May 15 10:04:08.671951 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.005ms. May 15 10:04:08.671964 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:04:08.671975 systemd[1]: Detected virtualization kvm. May 15 10:04:08.671991 systemd[1]: Detected architecture arm64. May 15 10:04:08.672002 systemd[1]: Detected first boot. May 15 10:04:08.672013 systemd[1]: Initializing machine ID from VM UUID. May 15 10:04:08.672024 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 10:04:08.672035 systemd[1]: Populated /etc with preset unit settings. May 15 10:04:08.672047 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:04:08.672058 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:04:08.672070 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:04:08.672083 kernel: kauditd_printk_skb: 80 callbacks suppressed May 15 10:04:08.672095 kernel: audit: type=1334 audit(1747303448.530:84): prog-id=12 op=LOAD May 15 10:04:08.672105 kernel: audit: type=1334 audit(1747303448.531:85): prog-id=3 op=UNLOAD May 15 10:04:08.672114 kernel: audit: type=1334 audit(1747303448.531:86): prog-id=13 op=LOAD May 15 10:04:08.672124 kernel: audit: type=1334 audit(1747303448.532:87): prog-id=14 op=LOAD May 15 10:04:08.672136 systemd[1]: iscsid.service: Deactivated successfully. May 15 10:04:08.672146 kernel: audit: type=1334 audit(1747303448.532:88): prog-id=4 op=UNLOAD May 15 10:04:08.672156 systemd[1]: Stopped iscsid.service. May 15 10:04:08.672167 kernel: audit: type=1334 audit(1747303448.532:89): prog-id=5 op=UNLOAD May 15 10:04:08.672177 kernel: audit: type=1131 audit(1747303448.533:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.672188 kernel: audit: type=1131 audit(1747303448.538:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.672199 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 10:04:08.672210 systemd[1]: Stopped initrd-switch-root.service. May 15 10:04:08.672222 kernel: audit: type=1130 audit(1747303448.541:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.672234 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 10:04:08.672248 kernel: audit: type=1131 audit(1747303448.541:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.672277 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 10:04:08.672292 systemd[1]: Created slice system-addon\x2drun.slice. May 15 10:04:08.672303 systemd[1]: Created slice system-getty.slice. May 15 10:04:08.672314 systemd[1]: Created slice system-modprobe.slice. May 15 10:04:08.672328 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 10:04:08.672339 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 10:04:08.672350 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 10:04:08.672361 systemd[1]: Created slice user.slice. May 15 10:04:08.672372 systemd[1]: Started systemd-ask-password-console.path. May 15 10:04:08.672383 systemd[1]: Started systemd-ask-password-wall.path. May 15 10:04:08.672394 systemd[1]: Set up automount boot.automount. May 15 10:04:08.672405 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 10:04:08.672416 systemd[1]: Stopped target initrd-switch-root.target. May 15 10:04:08.672428 systemd[1]: Stopped target initrd-fs.target. May 15 10:04:08.672439 systemd[1]: Stopped target initrd-root-fs.target. May 15 10:04:08.672450 systemd[1]: Reached target integritysetup.target. May 15 10:04:08.672461 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:04:08.672475 systemd[1]: Reached target remote-fs.target. May 15 10:04:08.672491 systemd[1]: Reached target slices.target. May 15 10:04:08.672502 systemd[1]: Reached target swap.target. May 15 10:04:08.672513 systemd[1]: Reached target torcx.target. May 15 10:04:08.672524 systemd[1]: Reached target veritysetup.target. May 15 10:04:08.672534 systemd[1]: Listening on systemd-coredump.socket. May 15 10:04:08.672546 systemd[1]: Listening on systemd-initctl.socket. May 15 10:04:08.672557 systemd[1]: Listening on systemd-networkd.socket. May 15 10:04:08.672567 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:04:08.672578 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:04:08.672588 systemd[1]: Listening on systemd-userdbd.socket. May 15 10:04:08.672599 systemd[1]: Mounting dev-hugepages.mount... May 15 10:04:08.672610 systemd[1]: Mounting dev-mqueue.mount... May 15 10:04:08.672623 systemd[1]: Mounting media.mount... May 15 10:04:08.672634 systemd[1]: Mounting sys-kernel-debug.mount... May 15 10:04:08.672646 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 10:04:08.672656 systemd[1]: Mounting tmp.mount... May 15 10:04:08.672667 systemd[1]: Starting flatcar-tmpfiles.service... May 15 10:04:08.672678 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:04:08.672689 systemd[1]: Starting kmod-static-nodes.service... May 15 10:04:08.672700 systemd[1]: Starting modprobe@configfs.service... May 15 10:04:08.672711 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:04:08.672721 systemd[1]: Starting modprobe@drm.service... May 15 10:04:08.672732 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:04:08.672744 systemd[1]: Starting modprobe@fuse.service... May 15 10:04:08.672755 systemd[1]: Starting modprobe@loop.service... May 15 10:04:08.672766 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 10:04:08.672777 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 10:04:08.672787 systemd[1]: Stopped systemd-fsck-root.service. May 15 10:04:08.672798 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 10:04:08.672808 systemd[1]: Stopped systemd-fsck-usr.service. May 15 10:04:08.672819 systemd[1]: Stopped systemd-journald.service. May 15 10:04:08.672829 systemd[1]: Starting systemd-journald.service... May 15 10:04:08.672841 systemd[1]: Starting systemd-modules-load.service... May 15 10:04:08.672852 systemd[1]: Starting systemd-network-generator.service... May 15 10:04:08.672862 systemd[1]: Starting systemd-remount-fs.service... May 15 10:04:08.672877 kernel: fuse: init (API version 7.34) May 15 10:04:08.672888 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:04:08.672899 systemd[1]: verity-setup.service: Deactivated successfully. May 15 10:04:08.672909 systemd[1]: Stopped verity-setup.service. May 15 10:04:08.672920 systemd[1]: Mounted dev-hugepages.mount. May 15 10:04:08.672930 kernel: loop: module loaded May 15 10:04:08.672939 systemd[1]: Mounted dev-mqueue.mount. May 15 10:04:08.672952 systemd[1]: Mounted media.mount. May 15 10:04:08.672962 systemd[1]: Mounted sys-kernel-debug.mount. May 15 10:04:08.672972 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 10:04:08.672982 systemd[1]: Mounted tmp.mount. May 15 10:04:08.672992 systemd[1]: Finished kmod-static-nodes.service. May 15 10:04:08.673002 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 10:04:08.673012 systemd[1]: Finished modprobe@configfs.service. May 15 10:04:08.673023 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:04:08.673034 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:04:08.673048 systemd-journald[987]: Journal started May 15 10:04:08.673096 systemd-journald[987]: Runtime Journal (/run/log/journal/0677caddf7664d95a4202426f856a87d) is 6.0M, max 48.7M, 42.6M free. May 15 10:04:06.633000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 10:04:06.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:04:06.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:04:06.706000 audit: BPF prog-id=10 op=LOAD May 15 10:04:06.706000 audit: BPF prog-id=10 op=UNLOAD May 15 10:04:06.706000 audit: BPF prog-id=11 op=LOAD May 15 10:04:06.706000 audit: BPF prog-id=11 op=UNLOAD May 15 10:04:06.757000 audit[929]: AVC avc: denied { associate } for pid=929 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 10:04:06.757000 audit[929]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c589c a1=40000c8de0 a2=40000cf040 a3=32 items=0 ppid=912 pid=929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:06.757000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:04:06.759000 audit[929]: AVC avc: denied { associate } for pid=929 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 10:04:06.759000 audit[929]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5979 a2=1ed a3=0 items=2 ppid=912 pid=929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:06.759000 audit: CWD cwd="/" May 15 10:04:06.759000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:04:06.759000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:04:06.759000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:04:08.530000 audit: BPF prog-id=12 op=LOAD May 15 10:04:08.531000 audit: BPF prog-id=3 op=UNLOAD May 15 10:04:08.531000 audit: BPF prog-id=13 op=LOAD May 15 10:04:08.532000 audit: BPF prog-id=14 op=LOAD May 15 10:04:08.532000 audit: BPF prog-id=4 op=UNLOAD May 15 10:04:08.532000 audit: BPF prog-id=5 op=UNLOAD May 15 10:04:08.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.548000 audit: BPF prog-id=12 op=UNLOAD May 15 10:04:08.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.634000 audit: BPF prog-id=15 op=LOAD May 15 10:04:08.634000 audit: BPF prog-id=16 op=LOAD May 15 10:04:08.634000 audit: BPF prog-id=17 op=LOAD May 15 10:04:08.634000 audit: BPF prog-id=13 op=UNLOAD May 15 10:04:08.634000 audit: BPF prog-id=14 op=UNLOAD May 15 10:04:08.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.663000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 10:04:08.663000 audit[987]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffeaa54b30 a2=4000 a3=1 items=0 ppid=1 pid=987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:08.663000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 10:04:08.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.529241 systemd[1]: Queued start job for default target multi-user.target. May 15 10:04:08.676489 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:04:08.676516 systemd[1]: Finished modprobe@drm.service. May 15 10:04:08.676530 systemd[1]: Started systemd-journald.service. May 15 10:04:08.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.753996 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:04:08.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.529267 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 10:04:06.754507 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:06Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:04:08.533060 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 10:04:06.754540 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:06Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:04:08.677001 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:04:06.754574 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:06Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 10:04:06.754584 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:06Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 10:04:08.677122 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:04:06.754620 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:06Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 10:04:06.754640 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:06Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 10:04:06.754856 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:06Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 10:04:06.754906 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:06Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:04:06.754922 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:06Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:04:06.757557 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:06Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 10:04:06.757607 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:06Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 10:04:06.757629 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:06Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 May 15 10:04:08.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:06.757642 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:06Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 10:04:06.757663 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:06Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 May 15 10:04:06.757676 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:06Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 10:04:08.245894 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:08Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:04:08.246237 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:08Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:04:08.246364 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:08Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:04:08.246626 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:08Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:04:08.246690 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:08Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 10:04:08.246755 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:04:08Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 10:04:08.678398 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 10:04:08.678547 systemd[1]: Finished modprobe@fuse.service. May 15 10:04:08.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.679468 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:04:08.682241 systemd[1]: Finished modprobe@loop.service. May 15 10:04:08.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.683212 systemd[1]: Finished systemd-modules-load.service. May 15 10:04:08.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.684342 systemd[1]: Finished systemd-network-generator.service. May 15 10:04:08.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.685512 systemd[1]: Finished systemd-remount-fs.service. May 15 10:04:08.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.686715 systemd[1]: Reached target network-pre.target. May 15 10:04:08.688730 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 10:04:08.690709 systemd[1]: Mounting sys-kernel-config.mount... May 15 10:04:08.691382 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 10:04:08.695991 systemd[1]: Starting systemd-hwdb-update.service... May 15 10:04:08.697901 systemd[1]: Starting systemd-journal-flush.service... May 15 10:04:08.698873 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:04:08.699906 systemd[1]: Starting systemd-random-seed.service... May 15 10:04:08.700826 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:04:08.701850 systemd[1]: Starting systemd-sysctl.service... May 15 10:04:08.704937 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 10:04:08.705969 systemd[1]: Mounted sys-kernel-config.mount. May 15 10:04:08.713178 systemd-journald[987]: Time spent on flushing to /var/log/journal/0677caddf7664d95a4202426f856a87d is 13.776ms for 990 entries. May 15 10:04:08.713178 systemd-journald[987]: System Journal (/var/log/journal/0677caddf7664d95a4202426f856a87d) is 8.0M, max 195.6M, 187.6M free. May 15 10:04:08.756009 systemd-journald[987]: Received client request to flush runtime journal. May 15 10:04:08.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.715946 systemd[1]: Finished flatcar-tmpfiles.service. May 15 10:04:08.718128 systemd[1]: Starting systemd-sysusers.service... May 15 10:04:08.756729 udevadm[1032]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 15 10:04:08.727720 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:04:08.730344 systemd[1]: Starting systemd-udev-settle.service... May 15 10:04:08.735118 systemd[1]: Finished systemd-random-seed.service. May 15 10:04:08.736253 systemd[1]: Reached target first-boot-complete.target. May 15 10:04:08.739882 systemd[1]: Finished systemd-sysctl.service. May 15 10:04:08.746227 systemd[1]: Finished systemd-sysusers.service. May 15 10:04:08.748306 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:04:08.756889 systemd[1]: Finished systemd-journal-flush.service. May 15 10:04:08.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:08.767707 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:04:08.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.172699 systemd[1]: Finished systemd-hwdb-update.service. May 15 10:04:09.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.173000 audit: BPF prog-id=18 op=LOAD May 15 10:04:09.174000 audit: BPF prog-id=19 op=LOAD May 15 10:04:09.174000 audit: BPF prog-id=7 op=UNLOAD May 15 10:04:09.174000 audit: BPF prog-id=8 op=UNLOAD May 15 10:04:09.174929 systemd[1]: Starting systemd-udevd.service... May 15 10:04:09.197403 systemd-udevd[1036]: Using default interface naming scheme 'v252'. May 15 10:04:09.212887 systemd[1]: Started systemd-udevd.service. May 15 10:04:09.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.216000 audit: BPF prog-id=20 op=LOAD May 15 10:04:09.218705 systemd[1]: Starting systemd-networkd.service... May 15 10:04:09.222000 audit: BPF prog-id=21 op=LOAD May 15 10:04:09.222000 audit: BPF prog-id=22 op=LOAD May 15 10:04:09.222000 audit: BPF prog-id=23 op=LOAD May 15 10:04:09.223539 systemd[1]: Starting systemd-userdbd.service... May 15 10:04:09.238670 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 15 10:04:09.252212 systemd[1]: Started systemd-userdbd.service. May 15 10:04:09.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.276540 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:04:09.305135 systemd-networkd[1052]: lo: Link UP May 15 10:04:09.305147 systemd-networkd[1052]: lo: Gained carrier May 15 10:04:09.305517 systemd-networkd[1052]: Enumeration completed May 15 10:04:09.305629 systemd-networkd[1052]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:04:09.305632 systemd[1]: Started systemd-networkd.service. May 15 10:04:09.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.306992 systemd-networkd[1052]: eth0: Link UP May 15 10:04:09.307003 systemd-networkd[1052]: eth0: Gained carrier May 15 10:04:09.330440 systemd-networkd[1052]: eth0: DHCPv4 address 10.0.0.18/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:04:09.339686 systemd[1]: Finished systemd-udev-settle.service. May 15 10:04:09.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.342067 systemd[1]: Starting lvm2-activation-early.service... May 15 10:04:09.381376 lvm[1069]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:04:09.406082 systemd[1]: Finished lvm2-activation-early.service. May 15 10:04:09.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.407151 systemd[1]: Reached target cryptsetup.target. May 15 10:04:09.409245 systemd[1]: Starting lvm2-activation.service... May 15 10:04:09.412871 lvm[1070]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:04:09.445143 systemd[1]: Finished lvm2-activation.service. May 15 10:04:09.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.446191 systemd[1]: Reached target local-fs-pre.target. May 15 10:04:09.447088 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 10:04:09.447124 systemd[1]: Reached target local-fs.target. May 15 10:04:09.448019 systemd[1]: Reached target machines.target. May 15 10:04:09.450403 systemd[1]: Starting ldconfig.service... May 15 10:04:09.451555 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:04:09.451665 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:04:09.453317 systemd[1]: Starting systemd-boot-update.service... May 15 10:04:09.455507 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 10:04:09.458030 systemd[1]: Starting systemd-machine-id-commit.service... May 15 10:04:09.460352 systemd[1]: Starting systemd-sysext.service... May 15 10:04:09.461645 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1072 (bootctl) May 15 10:04:09.462988 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 10:04:09.471845 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 10:04:09.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.478926 systemd[1]: Unmounting usr-share-oem.mount... May 15 10:04:09.485406 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 10:04:09.485600 systemd[1]: Unmounted usr-share-oem.mount. May 15 10:04:09.530790 systemd[1]: Finished systemd-machine-id-commit.service. May 15 10:04:09.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.537282 kernel: loop0: detected capacity change from 0 to 189592 May 15 10:04:09.551280 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 10:04:09.551378 systemd-fsck[1081]: fsck.fat 4.2 (2021-01-31) May 15 10:04:09.551378 systemd-fsck[1081]: /dev/vda1: 236 files, 117182/258078 clusters May 15 10:04:09.553183 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 10:04:09.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.579297 kernel: loop1: detected capacity change from 0 to 189592 May 15 10:04:09.588527 (sd-sysext)[1084]: Using extensions 'kubernetes'. May 15 10:04:09.589310 (sd-sysext)[1084]: Merged extensions into '/usr'. May 15 10:04:09.610660 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:04:09.614287 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:04:09.617268 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:04:09.619401 systemd[1]: Starting modprobe@loop.service... May 15 10:04:09.620966 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:04:09.621114 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:04:09.622012 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:04:09.622188 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:04:09.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.625894 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:04:09.626193 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:04:09.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.628156 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:04:09.628294 systemd[1]: Finished modprobe@loop.service. May 15 10:04:09.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.629389 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:04:09.629505 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:04:09.655783 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 10:04:09.657655 systemd[1]: Mounting boot.mount... May 15 10:04:09.659525 systemd[1]: Mounting usr-share-oem.mount... May 15 10:04:09.664161 systemd[1]: Mounted usr-share-oem.mount. May 15 10:04:09.666387 systemd[1]: Finished systemd-sysext.service. May 15 10:04:09.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.668553 systemd[1]: Mounted boot.mount. May 15 10:04:09.670314 systemd[1]: Starting ensure-sysext.service... May 15 10:04:09.672227 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 10:04:09.676462 systemd[1]: Reloading. May 15 10:04:09.682305 systemd-tmpfiles[1092]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 10:04:09.683602 systemd-tmpfiles[1092]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 10:04:09.685359 systemd-tmpfiles[1092]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 10:04:09.698327 ldconfig[1071]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 10:04:09.716525 /usr/lib/systemd/system-generators/torcx-generator[1112]: time="2025-05-15T10:04:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:04:09.716552 /usr/lib/systemd/system-generators/torcx-generator[1112]: time="2025-05-15T10:04:09Z" level=info msg="torcx already run" May 15 10:04:09.781074 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:04:09.781095 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:04:09.796760 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:04:09.838000 audit: BPF prog-id=24 op=LOAD May 15 10:04:09.838000 audit: BPF prog-id=15 op=UNLOAD May 15 10:04:09.838000 audit: BPF prog-id=25 op=LOAD May 15 10:04:09.838000 audit: BPF prog-id=26 op=LOAD May 15 10:04:09.838000 audit: BPF prog-id=16 op=UNLOAD May 15 10:04:09.838000 audit: BPF prog-id=17 op=UNLOAD May 15 10:04:09.839000 audit: BPF prog-id=27 op=LOAD May 15 10:04:09.839000 audit: BPF prog-id=21 op=UNLOAD May 15 10:04:09.839000 audit: BPF prog-id=28 op=LOAD May 15 10:04:09.839000 audit: BPF prog-id=29 op=LOAD May 15 10:04:09.839000 audit: BPF prog-id=22 op=UNLOAD May 15 10:04:09.839000 audit: BPF prog-id=23 op=UNLOAD May 15 10:04:09.842000 audit: BPF prog-id=30 op=LOAD May 15 10:04:09.842000 audit: BPF prog-id=20 op=UNLOAD May 15 10:04:09.842000 audit: BPF prog-id=31 op=LOAD May 15 10:04:09.842000 audit: BPF prog-id=32 op=LOAD May 15 10:04:09.842000 audit: BPF prog-id=18 op=UNLOAD May 15 10:04:09.842000 audit: BPF prog-id=19 op=UNLOAD May 15 10:04:09.844726 systemd[1]: Finished ldconfig.service. May 15 10:04:09.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.845692 systemd[1]: Finished systemd-boot-update.service. May 15 10:04:09.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.847423 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 10:04:09.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.850715 systemd[1]: Starting audit-rules.service... May 15 10:04:09.852746 systemd[1]: Starting clean-ca-certificates.service... May 15 10:04:09.855301 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 10:04:09.856000 audit: BPF prog-id=33 op=LOAD May 15 10:04:09.861000 audit: BPF prog-id=34 op=LOAD May 15 10:04:09.857988 systemd[1]: Starting systemd-resolved.service... May 15 10:04:09.865242 systemd[1]: Starting systemd-timesyncd.service... May 15 10:04:09.867306 systemd[1]: Starting systemd-update-utmp.service... May 15 10:04:09.872434 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:04:09.873809 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:04:09.877233 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:04:09.878000 audit[1161]: SYSTEM_BOOT pid=1161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 10:04:09.879374 systemd[1]: Starting modprobe@loop.service... May 15 10:04:09.880225 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:04:09.880387 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:04:09.881356 systemd[1]: Finished clean-ca-certificates.service. May 15 10:04:09.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.882693 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:04:09.882814 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:04:09.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.884046 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:04:09.884161 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:04:09.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.885706 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:04:09.886013 systemd[1]: Finished modprobe@loop.service. May 15 10:04:09.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.890193 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:04:09.891769 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:04:09.893964 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:04:09.896001 systemd[1]: Starting modprobe@loop.service... May 15 10:04:09.896932 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:04:09.897120 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:04:09.897284 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:04:09.898529 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 10:04:09.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.900063 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:04:09.900195 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:04:09.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.901567 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:04:09.901677 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:04:09.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.903389 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:04:09.903524 systemd[1]: Finished modprobe@loop.service. May 15 10:04:09.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.907071 systemd[1]: Finished systemd-update-utmp.service. May 15 10:04:09.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:09.909647 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:04:09.911022 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:04:09.912973 systemd[1]: Starting modprobe@drm.service... May 15 10:04:09.912000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 10:04:09.912000 audit[1176]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff57e5af0 a2=420 a3=0 items=0 ppid=1150 pid=1176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:09.912000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 10:04:09.913884 augenrules[1176]: No rules May 15 10:04:09.914963 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:04:09.917028 systemd[1]: Starting modprobe@loop.service... May 15 10:04:09.918007 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:04:09.918066 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:04:09.919103 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 10:04:09.921376 systemd[1]: Starting systemd-update-done.service... May 15 10:04:09.922375 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:04:09.923151 systemd[1]: Finished ensure-sysext.service. May 15 10:04:09.924402 systemd[1]: Finished audit-rules.service. May 15 10:04:09.925473 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:04:09.925621 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:04:09.926190 systemd-resolved[1154]: Positive Trust Anchors: May 15 10:04:09.926488 systemd-resolved[1154]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:04:09.926572 systemd-resolved[1154]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:04:09.926949 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:04:09.927081 systemd[1]: Finished modprobe@drm.service. May 15 10:04:09.928472 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:04:09.928589 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:04:09.929970 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:04:09.930098 systemd[1]: Finished modprobe@loop.service. May 15 10:04:09.931154 systemd[1]: Started systemd-timesyncd.service. May 15 10:04:09.932308 systemd-timesyncd[1155]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 15 10:04:09.932375 systemd-timesyncd[1155]: Initial clock synchronization to Thu 2025-05-15 10:04:10.036839 UTC. May 15 10:04:09.932771 systemd[1]: Finished systemd-update-done.service. May 15 10:04:09.934887 systemd[1]: Reached target time-set.target. May 15 10:04:09.935955 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:04:09.936004 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:04:09.941856 systemd-resolved[1154]: Defaulting to hostname 'linux'. May 15 10:04:09.943430 systemd[1]: Started systemd-resolved.service. May 15 10:04:09.944348 systemd[1]: Reached target network.target. May 15 10:04:09.945124 systemd[1]: Reached target nss-lookup.target. May 15 10:04:09.946039 systemd[1]: Reached target sysinit.target. May 15 10:04:09.946980 systemd[1]: Started motdgen.path. May 15 10:04:09.947726 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 10:04:09.949004 systemd[1]: Started logrotate.timer. May 15 10:04:09.949899 systemd[1]: Started mdadm.timer. May 15 10:04:09.950576 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 10:04:09.951414 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 10:04:09.951448 systemd[1]: Reached target paths.target. May 15 10:04:09.952180 systemd[1]: Reached target timers.target. May 15 10:04:09.953417 systemd[1]: Listening on dbus.socket. May 15 10:04:09.955283 systemd[1]: Starting docker.socket... May 15 10:04:09.959330 systemd[1]: Listening on sshd.socket. May 15 10:04:09.960209 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:04:09.960683 systemd[1]: Listening on docker.socket. May 15 10:04:09.961525 systemd[1]: Reached target sockets.target. May 15 10:04:09.962287 systemd[1]: Reached target basic.target. May 15 10:04:09.963046 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:04:09.963078 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:04:09.964169 systemd[1]: Starting containerd.service... May 15 10:04:09.965986 systemd[1]: Starting dbus.service... May 15 10:04:09.967943 systemd[1]: Starting enable-oem-cloudinit.service... May 15 10:04:09.969810 systemd[1]: Starting extend-filesystems.service... May 15 10:04:09.970885 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 10:04:09.974120 systemd[1]: Starting motdgen.service... May 15 10:04:09.980211 jq[1192]: false May 15 10:04:09.979985 systemd[1]: Starting prepare-helm.service... May 15 10:04:09.981915 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 10:04:09.984155 systemd[1]: Starting sshd-keygen.service... May 15 10:04:09.989714 systemd[1]: Starting systemd-logind.service... May 15 10:04:09.990497 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:04:09.990575 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 10:04:09.991006 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 10:04:09.991727 systemd[1]: Starting update-engine.service... May 15 10:04:09.993485 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 10:04:09.994057 extend-filesystems[1193]: Found loop1 May 15 10:04:09.994057 extend-filesystems[1193]: Found vda May 15 10:04:09.994057 extend-filesystems[1193]: Found vda1 May 15 10:04:09.994057 extend-filesystems[1193]: Found vda2 May 15 10:04:09.994057 extend-filesystems[1193]: Found vda3 May 15 10:04:09.994057 extend-filesystems[1193]: Found usr May 15 10:04:09.994057 extend-filesystems[1193]: Found vda4 May 15 10:04:09.994057 extend-filesystems[1193]: Found vda6 May 15 10:04:09.994057 extend-filesystems[1193]: Found vda7 May 15 10:04:09.994057 extend-filesystems[1193]: Found vda9 May 15 10:04:09.994057 extend-filesystems[1193]: Checking size of /dev/vda9 May 15 10:04:10.007127 jq[1210]: true May 15 10:04:09.996681 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 10:04:09.996885 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 10:04:09.997190 systemd[1]: motdgen.service: Deactivated successfully. May 15 10:04:09.997373 systemd[1]: Finished motdgen.service. May 15 10:04:10.000338 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 10:04:10.000541 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 10:04:10.013318 jq[1215]: true May 15 10:04:10.024527 tar[1214]: linux-arm64/helm May 15 10:04:10.033213 dbus-daemon[1191]: [system] SELinux support is enabled May 15 10:04:10.034050 systemd[1]: Started dbus.service. May 15 10:04:10.035349 extend-filesystems[1193]: Resized partition /dev/vda9 May 15 10:04:10.038199 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 10:04:10.038232 systemd[1]: Reached target system-config.target. May 15 10:04:10.039132 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 10:04:10.039159 systemd[1]: Reached target user-config.target. May 15 10:04:10.048480 extend-filesystems[1235]: resize2fs 1.46.5 (30-Dec-2021) May 15 10:04:10.065546 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 15 10:04:10.087080 update_engine[1209]: I0515 10:04:10.086535 1209 main.cc:92] Flatcar Update Engine starting May 15 10:04:10.089557 systemd-logind[1208]: Watching system buttons on /dev/input/event0 (Power Button) May 15 10:04:10.090512 systemd-logind[1208]: New seat seat0. May 15 10:04:10.094111 systemd[1]: Started update-engine.service. May 15 10:04:10.094415 update_engine[1209]: I0515 10:04:10.094367 1209 update_check_scheduler.cc:74] Next update check in 4m38s May 15 10:04:10.097067 systemd[1]: Started locksmithd.service. May 15 10:04:10.098465 systemd[1]: Started systemd-logind.service. May 15 10:04:10.102276 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 15 10:04:10.120845 extend-filesystems[1235]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 10:04:10.120845 extend-filesystems[1235]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 10:04:10.120845 extend-filesystems[1235]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 15 10:04:10.125425 extend-filesystems[1193]: Resized filesystem in /dev/vda9 May 15 10:04:10.121590 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 10:04:10.121753 systemd[1]: Finished extend-filesystems.service. May 15 10:04:10.129221 bash[1240]: Updated "/home/core/.ssh/authorized_keys" May 15 10:04:10.130068 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 10:04:10.133243 env[1216]: time="2025-05-15T10:04:10.133189758Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 10:04:10.153267 env[1216]: time="2025-05-15T10:04:10.153187863Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 10:04:10.153436 env[1216]: time="2025-05-15T10:04:10.153412121Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 10:04:10.158232 env[1216]: time="2025-05-15T10:04:10.157546265Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 10:04:10.158232 env[1216]: time="2025-05-15T10:04:10.157726149Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 10:04:10.158232 env[1216]: time="2025-05-15T10:04:10.157961551Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:04:10.158232 env[1216]: time="2025-05-15T10:04:10.157980030Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 10:04:10.158232 env[1216]: time="2025-05-15T10:04:10.157993727Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 10:04:10.158232 env[1216]: time="2025-05-15T10:04:10.158003736Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 10:04:10.158232 env[1216]: time="2025-05-15T10:04:10.158091146Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 10:04:10.158467 env[1216]: time="2025-05-15T10:04:10.158297493Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 10:04:10.158467 env[1216]: time="2025-05-15T10:04:10.158420279Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:04:10.158467 env[1216]: time="2025-05-15T10:04:10.158434949Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 10:04:10.158528 env[1216]: time="2025-05-15T10:04:10.158487062Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 10:04:10.158528 env[1216]: time="2025-05-15T10:04:10.158500192Z" level=info msg="metadata content store policy set" policy=shared May 15 10:04:10.162507 env[1216]: time="2025-05-15T10:04:10.162473497Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 10:04:10.162507 env[1216]: time="2025-05-15T10:04:10.162510536Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 10:04:10.162507 env[1216]: time="2025-05-15T10:04:10.162524233Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 10:04:10.162507 env[1216]: time="2025-05-15T10:04:10.162556814Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 10:04:10.162507 env[1216]: time="2025-05-15T10:04:10.162572456Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 10:04:10.162747 env[1216]: time="2025-05-15T10:04:10.162586842Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 10:04:10.162747 env[1216]: time="2025-05-15T10:04:10.162610021Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 10:04:10.163007 env[1216]: time="2025-05-15T10:04:10.162973275Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 10:04:10.163007 env[1216]: time="2025-05-15T10:04:10.162999494Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 10:04:10.163071 env[1216]: time="2025-05-15T10:04:10.163015015Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 10:04:10.163071 env[1216]: time="2025-05-15T10:04:10.163029158Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 10:04:10.163071 env[1216]: time="2025-05-15T10:04:10.163041922Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 10:04:10.163246 env[1216]: time="2025-05-15T10:04:10.163170464Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 10:04:10.163288 env[1216]: time="2025-05-15T10:04:10.163244743Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 10:04:10.163643 env[1216]: time="2025-05-15T10:04:10.163601879Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 10:04:10.163643 env[1216]: time="2025-05-15T10:04:10.163636729Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 10:04:10.163700 env[1216]: time="2025-05-15T10:04:10.163651155Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 10:04:10.163805 env[1216]: time="2025-05-15T10:04:10.163761299Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 10:04:10.163805 env[1216]: time="2025-05-15T10:04:10.163777224Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 10:04:10.163805 env[1216]: time="2025-05-15T10:04:10.163790435Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 10:04:10.163805 env[1216]: time="2025-05-15T10:04:10.163801741Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 10:04:10.163896 env[1216]: time="2025-05-15T10:04:10.163814020Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 10:04:10.163896 env[1216]: time="2025-05-15T10:04:10.163826380Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 10:04:10.163896 env[1216]: time="2025-05-15T10:04:10.163837199Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 10:04:10.163896 env[1216]: time="2025-05-15T10:04:10.163848141Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 10:04:10.163896 env[1216]: time="2025-05-15T10:04:10.163860176Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 10:04:10.164016 env[1216]: time="2025-05-15T10:04:10.163996093Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 10:04:10.164047 env[1216]: time="2025-05-15T10:04:10.164018381Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 10:04:10.164047 env[1216]: time="2025-05-15T10:04:10.164031227Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 10:04:10.164047 env[1216]: time="2025-05-15T10:04:10.164043465Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 10:04:10.164107 env[1216]: time="2025-05-15T10:04:10.164057405Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 10:04:10.164107 env[1216]: time="2025-05-15T10:04:10.164069967Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 10:04:10.164107 env[1216]: time="2025-05-15T10:04:10.164087190Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 10:04:10.164166 env[1216]: time="2025-05-15T10:04:10.164120257Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 10:04:10.164445 env[1216]: time="2025-05-15T10:04:10.164322146Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 10:04:10.164445 env[1216]: time="2025-05-15T10:04:10.164377785Z" level=info msg="Connect containerd service" May 15 10:04:10.164445 env[1216]: time="2025-05-15T10:04:10.164412068Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 10:04:10.167105 env[1216]: time="2025-05-15T10:04:10.165033174Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:04:10.167105 env[1216]: time="2025-05-15T10:04:10.165559617Z" level=info msg="Start subscribing containerd event" May 15 10:04:10.167105 env[1216]: time="2025-05-15T10:04:10.165598358Z" level=info msg="Start recovering state" May 15 10:04:10.167105 env[1216]: time="2025-05-15T10:04:10.165656226Z" level=info msg="Start event monitor" May 15 10:04:10.167105 env[1216]: time="2025-05-15T10:04:10.165673854Z" level=info msg="Start snapshots syncer" May 15 10:04:10.167105 env[1216]: time="2025-05-15T10:04:10.165683377Z" level=info msg="Start cni network conf syncer for default" May 15 10:04:10.167105 env[1216]: time="2025-05-15T10:04:10.165691562Z" level=info msg="Start streaming server" May 15 10:04:10.167105 env[1216]: time="2025-05-15T10:04:10.165911728Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 10:04:10.167105 env[1216]: time="2025-05-15T10:04:10.165952778Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 10:04:10.167105 env[1216]: time="2025-05-15T10:04:10.166046347Z" level=info msg="containerd successfully booted in 0.033552s" May 15 10:04:10.166123 systemd[1]: Started containerd.service. May 15 10:04:10.187671 locksmithd[1243]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 10:04:10.439496 tar[1214]: linux-arm64/LICENSE May 15 10:04:10.439496 tar[1214]: linux-arm64/README.md May 15 10:04:10.444100 systemd[1]: Finished prepare-helm.service. May 15 10:04:10.709288 systemd-networkd[1052]: eth0: Gained IPv6LL May 15 10:04:10.711013 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 10:04:10.712170 systemd[1]: Reached target network-online.target. May 15 10:04:10.714457 systemd[1]: Starting kubelet.service... May 15 10:04:10.935107 sshd_keygen[1213]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 10:04:10.953365 systemd[1]: Finished sshd-keygen.service. May 15 10:04:10.955800 systemd[1]: Starting issuegen.service... May 15 10:04:10.960501 systemd[1]: issuegen.service: Deactivated successfully. May 15 10:04:10.960664 systemd[1]: Finished issuegen.service. May 15 10:04:10.963044 systemd[1]: Starting systemd-user-sessions.service... May 15 10:04:10.969508 systemd[1]: Finished systemd-user-sessions.service. May 15 10:04:10.971965 systemd[1]: Started getty@tty1.service. May 15 10:04:10.974186 systemd[1]: Started serial-getty@ttyAMA0.service. May 15 10:04:10.975257 systemd[1]: Reached target getty.target. May 15 10:04:11.291233 systemd[1]: Started kubelet.service. May 15 10:04:11.292524 systemd[1]: Reached target multi-user.target. May 15 10:04:11.294718 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 10:04:11.301284 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 10:04:11.301449 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 10:04:11.302611 systemd[1]: Startup finished in 601ms (kernel) + 4.021s (initrd) + 4.706s (userspace) = 9.329s. May 15 10:04:11.772085 kubelet[1273]: E0515 10:04:11.771973 1273 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:04:11.775229 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:04:11.775365 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:04:15.393557 systemd[1]: Created slice system-sshd.slice. May 15 10:04:15.394676 systemd[1]: Started sshd@0-10.0.0.18:22-10.0.0.1:55960.service. May 15 10:04:15.449135 sshd[1282]: Accepted publickey for core from 10.0.0.1 port 55960 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:04:15.451553 sshd[1282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:04:15.459527 systemd[1]: Created slice user-500.slice. May 15 10:04:15.460702 systemd[1]: Starting user-runtime-dir@500.service... May 15 10:04:15.462321 systemd-logind[1208]: New session 1 of user core. May 15 10:04:15.469063 systemd[1]: Finished user-runtime-dir@500.service. May 15 10:04:15.470449 systemd[1]: Starting user@500.service... May 15 10:04:15.473231 (systemd)[1285]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 10:04:15.540254 systemd[1285]: Queued start job for default target default.target. May 15 10:04:15.540793 systemd[1285]: Reached target paths.target. May 15 10:04:15.540827 systemd[1285]: Reached target sockets.target. May 15 10:04:15.540838 systemd[1285]: Reached target timers.target. May 15 10:04:15.540849 systemd[1285]: Reached target basic.target. May 15 10:04:15.540893 systemd[1285]: Reached target default.target. May 15 10:04:15.540922 systemd[1285]: Startup finished in 61ms. May 15 10:04:15.541042 systemd[1]: Started user@500.service. May 15 10:04:15.542064 systemd[1]: Started session-1.scope. May 15 10:04:15.597196 systemd[1]: Started sshd@1-10.0.0.18:22-10.0.0.1:55964.service. May 15 10:04:15.629065 sshd[1294]: Accepted publickey for core from 10.0.0.1 port 55964 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:04:15.630338 sshd[1294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:04:15.634548 systemd-logind[1208]: New session 2 of user core. May 15 10:04:15.635365 systemd[1]: Started session-2.scope. May 15 10:04:15.692351 sshd[1294]: pam_unix(sshd:session): session closed for user core May 15 10:04:15.695794 systemd[1]: Started sshd@2-10.0.0.18:22-10.0.0.1:55968.service. May 15 10:04:15.696243 systemd[1]: sshd@1-10.0.0.18:22-10.0.0.1:55964.service: Deactivated successfully. May 15 10:04:15.696966 systemd[1]: session-2.scope: Deactivated successfully. May 15 10:04:15.697585 systemd-logind[1208]: Session 2 logged out. Waiting for processes to exit. May 15 10:04:15.698589 systemd-logind[1208]: Removed session 2. May 15 10:04:15.728121 sshd[1299]: Accepted publickey for core from 10.0.0.1 port 55968 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:04:15.729407 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:04:15.733150 systemd-logind[1208]: New session 3 of user core. May 15 10:04:15.733583 systemd[1]: Started session-3.scope. May 15 10:04:15.790596 sshd[1299]: pam_unix(sshd:session): session closed for user core May 15 10:04:15.794496 systemd[1]: Started sshd@3-10.0.0.18:22-10.0.0.1:55982.service. May 15 10:04:15.795001 systemd[1]: sshd@2-10.0.0.18:22-10.0.0.1:55968.service: Deactivated successfully. May 15 10:04:15.796085 systemd-logind[1208]: Session 3 logged out. Waiting for processes to exit. May 15 10:04:15.796192 systemd[1]: session-3.scope: Deactivated successfully. May 15 10:04:15.799163 systemd-logind[1208]: Removed session 3. May 15 10:04:15.831717 sshd[1305]: Accepted publickey for core from 10.0.0.1 port 55982 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:04:15.833087 sshd[1305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:04:15.837022 systemd-logind[1208]: New session 4 of user core. May 15 10:04:15.838819 systemd[1]: Started session-4.scope. May 15 10:04:15.896097 sshd[1305]: pam_unix(sshd:session): session closed for user core May 15 10:04:15.903862 systemd[1]: Started sshd@4-10.0.0.18:22-10.0.0.1:55998.service. May 15 10:04:15.904575 systemd[1]: sshd@3-10.0.0.18:22-10.0.0.1:55982.service: Deactivated successfully. May 15 10:04:15.905520 systemd[1]: session-4.scope: Deactivated successfully. May 15 10:04:15.909759 systemd-logind[1208]: Session 4 logged out. Waiting for processes to exit. May 15 10:04:15.910816 systemd-logind[1208]: Removed session 4. May 15 10:04:15.934684 sshd[1311]: Accepted publickey for core from 10.0.0.1 port 55998 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:04:15.936259 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:04:15.939687 systemd-logind[1208]: New session 5 of user core. May 15 10:04:15.940539 systemd[1]: Started session-5.scope. May 15 10:04:16.002102 sudo[1315]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 10:04:16.003331 sudo[1315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:04:16.014485 dbus-daemon[1191]: avc: received setenforce notice (enforcing=1) May 15 10:04:16.016528 sudo[1315]: pam_unix(sudo:session): session closed for user root May 15 10:04:16.018741 sshd[1311]: pam_unix(sshd:session): session closed for user core May 15 10:04:16.021680 systemd[1]: sshd@4-10.0.0.18:22-10.0.0.1:55998.service: Deactivated successfully. May 15 10:04:16.022320 systemd[1]: session-5.scope: Deactivated successfully. May 15 10:04:16.022901 systemd-logind[1208]: Session 5 logged out. Waiting for processes to exit. May 15 10:04:16.024097 systemd[1]: Started sshd@5-10.0.0.18:22-10.0.0.1:56000.service. May 15 10:04:16.024820 systemd-logind[1208]: Removed session 5. May 15 10:04:16.056503 sshd[1319]: Accepted publickey for core from 10.0.0.1 port 56000 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:04:16.058055 sshd[1319]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:04:16.061770 systemd-logind[1208]: New session 6 of user core. May 15 10:04:16.062173 systemd[1]: Started session-6.scope. May 15 10:04:16.115258 sudo[1323]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 10:04:16.115811 sudo[1323]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:04:16.118883 sudo[1323]: pam_unix(sudo:session): session closed for user root May 15 10:04:16.123866 sudo[1322]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 10:04:16.124090 sudo[1322]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:04:16.132885 systemd[1]: Stopping audit-rules.service... May 15 10:04:16.132000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:04:16.134217 auditctl[1326]: No rules May 15 10:04:16.134465 systemd[1]: audit-rules.service: Deactivated successfully. May 15 10:04:16.134631 systemd[1]: Stopped audit-rules.service. May 15 10:04:16.134674 kernel: kauditd_printk_skb: 105 callbacks suppressed May 15 10:04:16.134707 kernel: audit: type=1305 audit(1747303456.132:195): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:04:16.132000 audit[1326]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcfe0ceb0 a2=420 a3=0 items=0 ppid=1 pid=1326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.136093 systemd[1]: Starting audit-rules.service... May 15 10:04:16.138623 kernel: audit: type=1300 audit(1747303456.132:195): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcfe0ceb0 a2=420 a3=0 items=0 ppid=1 pid=1326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.138684 kernel: audit: type=1327 audit(1747303456.132:195): proctitle=2F7362696E2F617564697463746C002D44 May 15 10:04:16.132000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 10:04:16.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:16.141622 kernel: audit: type=1131 audit(1747303456.133:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:16.152373 augenrules[1343]: No rules May 15 10:04:16.153059 systemd[1]: Finished audit-rules.service. May 15 10:04:16.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:16.154297 sudo[1322]: pam_unix(sudo:session): session closed for user root May 15 10:04:16.154000 audit[1322]: USER_END pid=1322 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:04:16.156451 sshd[1319]: pam_unix(sshd:session): session closed for user core May 15 10:04:16.159273 kernel: audit: type=1130 audit(1747303456.152:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:16.159335 kernel: audit: type=1106 audit(1747303456.154:198): pid=1322 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:04:16.159373 kernel: audit: type=1104 audit(1747303456.154:199): pid=1322 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:04:16.154000 audit[1322]: CRED_DISP pid=1322 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:04:16.159759 systemd[1]: Started sshd@6-10.0.0.18:22-10.0.0.1:56016.service. May 15 10:04:16.157000 audit[1319]: USER_END pid=1319 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:04:16.160328 systemd[1]: sshd@5-10.0.0.18:22-10.0.0.1:56000.service: Deactivated successfully. May 15 10:04:16.160961 systemd[1]: session-6.scope: Deactivated successfully. May 15 10:04:16.163269 kernel: audit: type=1106 audit(1747303456.157:200): pid=1319 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:04:16.163336 kernel: audit: type=1104 audit(1747303456.157:201): pid=1319 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:04:16.157000 audit[1319]: CRED_DISP pid=1319 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:04:16.165092 systemd-logind[1208]: Session 6 logged out. Waiting for processes to exit. May 15 10:04:16.165740 kernel: audit: type=1130 audit(1747303456.159:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.18:22-10.0.0.1:56016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:16.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.18:22-10.0.0.1:56016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:16.166132 systemd-logind[1208]: Removed session 6. May 15 10:04:16.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.18:22-10.0.0.1:56000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:16.192000 audit[1348]: USER_ACCT pid=1348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:04:16.194365 sshd[1348]: Accepted publickey for core from 10.0.0.1 port 56016 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:04:16.194000 audit[1348]: CRED_ACQ pid=1348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:04:16.194000 audit[1348]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2762080 a2=3 a3=1 items=0 ppid=1 pid=1348 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.194000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:04:16.195941 sshd[1348]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:04:16.199703 systemd-logind[1208]: New session 7 of user core. May 15 10:04:16.200154 systemd[1]: Started session-7.scope. May 15 10:04:16.202000 audit[1348]: USER_START pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:04:16.204000 audit[1351]: CRED_ACQ pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:04:16.253084 sudo[1352]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 10:04:16.251000 audit[1352]: USER_ACCT pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:04:16.251000 audit[1352]: CRED_REFR pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:04:16.254084 sudo[1352]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:04:16.254000 audit[1352]: USER_START pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:04:16.315704 systemd[1]: Starting docker.service... May 15 10:04:16.399996 env[1364]: time="2025-05-15T10:04:16.399930755Z" level=info msg="Starting up" May 15 10:04:16.401725 env[1364]: time="2025-05-15T10:04:16.401695423Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:04:16.401897 env[1364]: time="2025-05-15T10:04:16.401879096Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:04:16.401978 env[1364]: time="2025-05-15T10:04:16.401961537Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:04:16.402029 env[1364]: time="2025-05-15T10:04:16.402017665Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:04:16.404320 env[1364]: time="2025-05-15T10:04:16.404278511Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:04:16.404436 env[1364]: time="2025-05-15T10:04:16.404422673Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:04:16.404574 env[1364]: time="2025-05-15T10:04:16.404552793Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:04:16.404631 env[1364]: time="2025-05-15T10:04:16.404617894Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:04:16.409105 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2265887607-merged.mount: Deactivated successfully. May 15 10:04:16.489129 env[1364]: time="2025-05-15T10:04:16.489088702Z" level=info msg="Loading containers: start." May 15 10:04:16.539000 audit[1398]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.539000 audit[1398]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffe609af00 a2=0 a3=1 items=0 ppid=1364 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.539000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 15 10:04:16.541000 audit[1400]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.541000 audit[1400]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc8b3a6f0 a2=0 a3=1 items=0 ppid=1364 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.541000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 15 10:04:16.543000 audit[1402]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.543000 audit[1402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe5879900 a2=0 a3=1 items=0 ppid=1364 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.543000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:04:16.544000 audit[1404]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.544000 audit[1404]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff6d9d510 a2=0 a3=1 items=0 ppid=1364 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.544000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:04:16.547000 audit[1406]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.547000 audit[1406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe5015b30 a2=0 a3=1 items=0 ppid=1364 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.547000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 15 10:04:16.581000 audit[1411]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.581000 audit[1411]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdd972580 a2=0 a3=1 items=0 ppid=1364 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.581000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 15 10:04:16.590000 audit[1413]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.590000 audit[1413]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe6ab3fc0 a2=0 a3=1 items=0 ppid=1364 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.590000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 15 10:04:16.592000 audit[1415]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.592000 audit[1415]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffdfbb2e10 a2=0 a3=1 items=0 ppid=1364 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.592000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 15 10:04:16.594000 audit[1417]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.594000 audit[1417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffd9332920 a2=0 a3=1 items=0 ppid=1364 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.594000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:04:16.601000 audit[1421]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.601000 audit[1421]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc720b850 a2=0 a3=1 items=0 ppid=1364 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.601000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:04:16.615000 audit[1422]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.615000 audit[1422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd8a6cf20 a2=0 a3=1 items=0 ppid=1364 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.615000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:04:16.627304 kernel: Initializing XFRM netlink socket May 15 10:04:16.652196 env[1364]: time="2025-05-15T10:04:16.652149728Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 15 10:04:16.670000 audit[1430]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.670000 audit[1430]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc44a9d30 a2=0 a3=1 items=0 ppid=1364 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.670000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 15 10:04:16.685000 audit[1433]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.685000 audit[1433]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffffeaa6000 a2=0 a3=1 items=0 ppid=1364 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.685000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 15 10:04:16.687000 audit[1436]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.687000 audit[1436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff8cbfd10 a2=0 a3=1 items=0 ppid=1364 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.687000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 15 10:04:16.689000 audit[1438]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.689000 audit[1438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd16a4910 a2=0 a3=1 items=0 ppid=1364 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.689000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 15 10:04:16.691000 audit[1440]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.691000 audit[1440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffd1779ac0 a2=0 a3=1 items=0 ppid=1364 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.691000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 15 10:04:16.693000 audit[1442]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.693000 audit[1442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffd1fe0990 a2=0 a3=1 items=0 ppid=1364 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.693000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 15 10:04:16.695000 audit[1444]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.695000 audit[1444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffe0374770 a2=0 a3=1 items=0 ppid=1364 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.695000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 15 10:04:16.706000 audit[1447]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.706000 audit[1447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffff547c800 a2=0 a3=1 items=0 ppid=1364 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.706000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 15 10:04:16.708000 audit[1449]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.708000 audit[1449]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffffaec7950 a2=0 a3=1 items=0 ppid=1364 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.708000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:04:16.711000 audit[1451]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.711000 audit[1451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffc339d540 a2=0 a3=1 items=0 ppid=1364 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.711000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:04:16.713000 audit[1453]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.713000 audit[1453]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe5dcf800 a2=0 a3=1 items=0 ppid=1364 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.713000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 15 10:04:16.715240 systemd-networkd[1052]: docker0: Link UP May 15 10:04:16.724000 audit[1457]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.724000 audit[1457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff2a93b40 a2=0 a3=1 items=0 ppid=1364 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.724000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:04:16.734000 audit[1458]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:16.734000 audit[1458]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffffe2d9ff0 a2=0 a3=1 items=0 ppid=1364 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:16.734000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:04:16.735945 env[1364]: time="2025-05-15T10:04:16.735896789Z" level=info msg="Loading containers: done." May 15 10:04:16.752419 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1603883760-merged.mount: Deactivated successfully. May 15 10:04:16.760499 env[1364]: time="2025-05-15T10:04:16.760450813Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 15 10:04:16.760668 env[1364]: time="2025-05-15T10:04:16.760638469Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 15 10:04:16.760751 env[1364]: time="2025-05-15T10:04:16.760732740Z" level=info msg="Daemon has completed initialization" May 15 10:04:16.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:16.775643 systemd[1]: Started docker.service. May 15 10:04:16.782151 env[1364]: time="2025-05-15T10:04:16.782103570Z" level=info msg="API listen on /run/docker.sock" May 15 10:04:17.565442 env[1216]: time="2025-05-15T10:04:17.565383526Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\"" May 15 10:04:18.130899 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1964041910.mount: Deactivated successfully. May 15 10:04:19.866412 env[1216]: time="2025-05-15T10:04:19.866349301Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:19.870573 env[1216]: time="2025-05-15T10:04:19.870540493Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef8fb1ea7c9599dbedea6f9d5589975ebc5bf4ec72f6be6acaaec59a723a09b3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:19.875930 env[1216]: time="2025-05-15T10:04:19.875883843Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:19.878845 env[1216]: time="2025-05-15T10:04:19.878816099Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:30090db6a7d53799163ce82dae9e8ddb645fd47db93f2ec9da0cc787fd825625,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:19.879773 env[1216]: time="2025-05-15T10:04:19.879731287Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\" returns image reference \"sha256:ef8fb1ea7c9599dbedea6f9d5589975ebc5bf4ec72f6be6acaaec59a723a09b3\"" May 15 10:04:19.880573 env[1216]: time="2025-05-15T10:04:19.880546403Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\"" May 15 10:04:21.668361 env[1216]: time="2025-05-15T10:04:21.668306830Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:21.670503 env[1216]: time="2025-05-15T10:04:21.670453239Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ea6e6085feca75547d0422ab0536fe0d18c9ff5831de7a9d6a707c968027bb6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:21.672554 env[1216]: time="2025-05-15T10:04:21.672526267Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:21.674458 env[1216]: time="2025-05-15T10:04:21.674427660Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:29eaddc64792a689df48506e78bbc641d063ac8bb92d2e66ae2ad05977420747,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:21.675205 env[1216]: time="2025-05-15T10:04:21.675175507Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\" returns image reference \"sha256:ea6e6085feca75547d0422ab0536fe0d18c9ff5831de7a9d6a707c968027bb6a\"" May 15 10:04:21.675836 env[1216]: time="2025-05-15T10:04:21.675803393Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\"" May 15 10:04:22.026219 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 10:04:22.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:22.026433 systemd[1]: Stopped kubelet.service. May 15 10:04:22.027858 systemd[1]: Starting kubelet.service... May 15 10:04:22.029331 kernel: kauditd_printk_skb: 84 callbacks suppressed May 15 10:04:22.030281 kernel: audit: type=1130 audit(1747303462.026:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:22.030328 kernel: audit: type=1131 audit(1747303462.026:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:22.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:22.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:22.114121 systemd[1]: Started kubelet.service. May 15 10:04:22.117333 kernel: audit: type=1130 audit(1747303462.113:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:22.153473 kubelet[1498]: E0515 10:04:22.153428 1498 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:04:22.155906 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:04:22.156038 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:04:22.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:04:22.159290 kernel: audit: type=1131 audit(1747303462.155:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:04:23.458741 env[1216]: time="2025-05-15T10:04:23.458625327Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:23.462416 env[1216]: time="2025-05-15T10:04:23.462379729Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d2db6ef0dd2f3e08bdfcd46afde7b755b05192841f563d8df54b807daaa7d8d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:23.465194 env[1216]: time="2025-05-15T10:04:23.465137237Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:23.466921 env[1216]: time="2025-05-15T10:04:23.466876441Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:22994a2632e81059720480b9f6bdeb133b08d58492d0b36dfd6e9768b159b22a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:23.467924 env[1216]: time="2025-05-15T10:04:23.467812315Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\" returns image reference \"sha256:1d2db6ef0dd2f3e08bdfcd46afde7b755b05192841f563d8df54b807daaa7d8d\"" May 15 10:04:23.468498 env[1216]: time="2025-05-15T10:04:23.468472916Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 15 10:04:24.657749 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2266182792.mount: Deactivated successfully. May 15 10:04:25.389887 env[1216]: time="2025-05-15T10:04:25.389827043Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:25.392943 env[1216]: time="2025-05-15T10:04:25.392482486Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c5361ece77e80334cd5fb082c0b678cb3244f5834ecacea1719ae6b38b465581,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:25.394998 env[1216]: time="2025-05-15T10:04:25.394696189Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:25.397084 env[1216]: time="2025-05-15T10:04:25.396321575Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:25.397084 env[1216]: time="2025-05-15T10:04:25.396702327Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:c5361ece77e80334cd5fb082c0b678cb3244f5834ecacea1719ae6b38b465581\"" May 15 10:04:25.397768 env[1216]: time="2025-05-15T10:04:25.397738314Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 15 10:04:25.876574 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1072992097.mount: Deactivated successfully. May 15 10:04:26.815736 env[1216]: time="2025-05-15T10:04:26.815668568Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:26.817085 env[1216]: time="2025-05-15T10:04:26.817048017Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:26.820093 env[1216]: time="2025-05-15T10:04:26.820053415Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:26.824816 env[1216]: time="2025-05-15T10:04:26.824776103Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:26.825742 env[1216]: time="2025-05-15T10:04:26.825692678Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" May 15 10:04:26.826378 env[1216]: time="2025-05-15T10:04:26.826353418Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 15 10:04:27.329350 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount107553396.mount: Deactivated successfully. May 15 10:04:27.341666 env[1216]: time="2025-05-15T10:04:27.341616987Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:27.343244 env[1216]: time="2025-05-15T10:04:27.343203049Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:27.344541 env[1216]: time="2025-05-15T10:04:27.344505768Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:27.346595 env[1216]: time="2025-05-15T10:04:27.346555497Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:27.346881 env[1216]: time="2025-05-15T10:04:27.346852698Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" May 15 10:04:27.347311 env[1216]: time="2025-05-15T10:04:27.347282839Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 15 10:04:27.872130 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2141325886.mount: Deactivated successfully. May 15 10:04:30.704209 env[1216]: time="2025-05-15T10:04:30.704160296Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:30.834949 env[1216]: time="2025-05-15T10:04:30.834902849Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:30.837197 env[1216]: time="2025-05-15T10:04:30.837169581Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:30.838968 env[1216]: time="2025-05-15T10:04:30.838939703Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:30.839874 env[1216]: time="2025-05-15T10:04:30.839819099Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da\"" May 15 10:04:32.406831 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 10:04:32.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:32.407009 systemd[1]: Stopped kubelet.service. May 15 10:04:32.408523 systemd[1]: Starting kubelet.service... May 15 10:04:32.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:32.410773 kernel: audit: type=1130 audit(1747303472.405:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:32.410857 kernel: audit: type=1131 audit(1747303472.405:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:32.494213 systemd[1]: Started kubelet.service. May 15 10:04:32.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:32.497270 kernel: audit: type=1130 audit(1747303472.493:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:32.528809 kubelet[1528]: E0515 10:04:32.528769 1528 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:04:32.530369 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:04:32.530493 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:04:32.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:04:32.533278 kernel: audit: type=1131 audit(1747303472.529:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:04:36.423335 systemd[1]: Stopped kubelet.service. May 15 10:04:36.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:36.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:36.425645 systemd[1]: Starting kubelet.service... May 15 10:04:36.427328 kernel: audit: type=1130 audit(1747303476.422:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:36.427407 kernel: audit: type=1131 audit(1747303476.422:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:36.456133 systemd[1]: Reloading. May 15 10:04:36.507493 /usr/lib/systemd/system-generators/torcx-generator[1565]: time="2025-05-15T10:04:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:04:36.507521 /usr/lib/systemd/system-generators/torcx-generator[1565]: time="2025-05-15T10:04:36Z" level=info msg="torcx already run" May 15 10:04:36.695239 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:04:36.695267 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:04:36.710914 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:04:36.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.762877 kernel: audit: type=1400 audit(1747303476.758:247): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.762950 kernel: audit: type=1400 audit(1747303476.758:248): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.762990 kernel: audit: type=1400 audit(1747303476.758:249): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.764735 kernel: audit: type=1400 audit(1747303476.758:250): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.760000 audit: BPF prog-id=40 op=LOAD May 15 10:04:36.760000 audit: BPF prog-id=24 op=UNLOAD May 15 10:04:36.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.762000 audit: BPF prog-id=41 op=LOAD May 15 10:04:36.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.764000 audit: BPF prog-id=42 op=LOAD May 15 10:04:36.764000 audit: BPF prog-id=25 op=UNLOAD May 15 10:04:36.764000 audit: BPF prog-id=26 op=UNLOAD May 15 10:04:36.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit: BPF prog-id=43 op=LOAD May 15 10:04:36.766000 audit: BPF prog-id=27 op=UNLOAD May 15 10:04:36.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit: BPF prog-id=44 op=LOAD May 15 10:04:36.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit: BPF prog-id=45 op=LOAD May 15 10:04:36.766000 audit: BPF prog-id=28 op=UNLOAD May 15 10:04:36.766000 audit: BPF prog-id=29 op=UNLOAD May 15 10:04:36.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.766000 audit: BPF prog-id=46 op=LOAD May 15 10:04:36.766000 audit: BPF prog-id=34 op=UNLOAD May 15 10:04:36.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.769000 audit: BPF prog-id=47 op=LOAD May 15 10:04:36.769000 audit: BPF prog-id=33 op=UNLOAD May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit: BPF prog-id=48 op=LOAD May 15 10:04:36.770000 audit: BPF prog-id=35 op=UNLOAD May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit: BPF prog-id=49 op=LOAD May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit: BPF prog-id=50 op=LOAD May 15 10:04:36.770000 audit: BPF prog-id=36 op=UNLOAD May 15 10:04:36.770000 audit: BPF prog-id=37 op=UNLOAD May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.770000 audit: BPF prog-id=51 op=LOAD May 15 10:04:36.770000 audit: BPF prog-id=30 op=UNLOAD May 15 10:04:36.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit: BPF prog-id=52 op=LOAD May 15 10:04:36.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.771000 audit: BPF prog-id=53 op=LOAD May 15 10:04:36.771000 audit: BPF prog-id=31 op=UNLOAD May 15 10:04:36.771000 audit: BPF prog-id=32 op=UNLOAD May 15 10:04:36.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:36.772000 audit: BPF prog-id=54 op=LOAD May 15 10:04:36.772000 audit: BPF prog-id=38 op=UNLOAD May 15 10:04:36.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:36.780697 systemd[1]: Started kubelet.service. May 15 10:04:36.784355 systemd[1]: Stopping kubelet.service... May 15 10:04:36.784949 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:04:36.785239 systemd[1]: Stopped kubelet.service. May 15 10:04:36.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:36.787084 systemd[1]: Starting kubelet.service... May 15 10:04:36.873907 systemd[1]: Started kubelet.service. May 15 10:04:36.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:36.910224 kubelet[1612]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:04:36.910224 kubelet[1612]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 10:04:36.910224 kubelet[1612]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:04:36.910604 kubelet[1612]: I0515 10:04:36.910544 1612 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:04:37.984558 kubelet[1612]: I0515 10:04:37.984506 1612 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 15 10:04:37.984558 kubelet[1612]: I0515 10:04:37.984545 1612 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:04:37.984903 kubelet[1612]: I0515 10:04:37.984783 1612 server.go:929] "Client rotation is on, will bootstrap in background" May 15 10:04:38.026970 kubelet[1612]: E0515 10:04:38.026922 1612 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.18:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 15 10:04:38.032321 kubelet[1612]: I0515 10:04:38.032280 1612 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:04:38.040283 kubelet[1612]: E0515 10:04:38.040221 1612 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 10:04:38.040283 kubelet[1612]: I0515 10:04:38.040286 1612 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 10:04:38.043911 kubelet[1612]: I0515 10:04:38.043888 1612 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:04:38.044207 kubelet[1612]: I0515 10:04:38.044186 1612 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 15 10:04:38.044359 kubelet[1612]: I0515 10:04:38.044324 1612 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:04:38.044541 kubelet[1612]: I0515 10:04:38.044355 1612 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 10:04:38.044677 kubelet[1612]: I0515 10:04:38.044666 1612 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:04:38.044677 kubelet[1612]: I0515 10:04:38.044677 1612 container_manager_linux.go:300] "Creating device plugin manager" May 15 10:04:38.044882 kubelet[1612]: I0515 10:04:38.044861 1612 state_mem.go:36] "Initialized new in-memory state store" May 15 10:04:38.048301 kubelet[1612]: I0515 10:04:38.048266 1612 kubelet.go:408] "Attempting to sync node with API server" May 15 10:04:38.048379 kubelet[1612]: I0515 10:04:38.048319 1612 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:04:38.048464 kubelet[1612]: I0515 10:04:38.048443 1612 kubelet.go:314] "Adding apiserver pod source" May 15 10:04:38.048464 kubelet[1612]: I0515 10:04:38.048462 1612 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:04:38.049601 kubelet[1612]: W0515 10:04:38.049477 1612 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.18:6443: connect: connection refused May 15 10:04:38.049601 kubelet[1612]: E0515 10:04:38.049553 1612 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 15 10:04:38.051444 kubelet[1612]: W0515 10:04:38.051381 1612 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.18:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.18:6443: connect: connection refused May 15 10:04:38.051537 kubelet[1612]: E0515 10:04:38.051448 1612 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.18:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 15 10:04:38.052174 kubelet[1612]: I0515 10:04:38.052136 1612 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:04:38.056107 kubelet[1612]: I0515 10:04:38.056074 1612 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:04:38.059702 kubelet[1612]: W0515 10:04:38.059674 1612 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 10:04:38.061616 kubelet[1612]: I0515 10:04:38.061534 1612 server.go:1269] "Started kubelet" May 15 10:04:38.061704 kubelet[1612]: I0515 10:04:38.061676 1612 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:04:38.061000 audit[1612]: AVC avc: denied { mac_admin } for pid=1612 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:38.062885 kubelet[1612]: I0515 10:04:38.062799 1612 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:04:38.062885 kubelet[1612]: I0515 10:04:38.062837 1612 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 10:04:38.063482 kernel: kauditd_printk_skb: 171 callbacks suppressed May 15 10:04:38.063557 kernel: audit: type=1400 audit(1747303478.061:422): avc: denied { mac_admin } for pid=1612 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:38.063577 kubelet[1612]: I0515 10:04:38.063319 1612 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:04:38.063577 kubelet[1612]: I0515 10:04:38.063459 1612 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:04:38.063830 kubelet[1612]: I0515 10:04:38.063809 1612 server.go:460] "Adding debug handlers to kubelet server" May 15 10:04:38.064446 kubelet[1612]: I0515 10:04:38.064401 1612 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:04:38.061000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:04:38.065359 kubelet[1612]: I0515 10:04:38.065335 1612 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 10:04:38.066190 kernel: audit: type=1401 audit(1747303478.061:422): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:04:38.066275 kernel: audit: type=1300 audit(1747303478.061:422): arch=c00000b7 syscall=5 success=no exit=-22 a0=40006e7d70 a1=4000519d40 a2=40006e7d40 a3=25 items=0 ppid=1 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.061000 audit[1612]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40006e7d70 a1=4000519d40 a2=40006e7d40 a3=25 items=0 ppid=1 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.068866 kernel: audit: type=1327 audit(1747303478.061:422): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:04:38.061000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:04:38.071631 kernel: audit: type=1400 audit(1747303478.061:423): avc: denied { mac_admin } for pid=1612 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:38.061000 audit[1612]: AVC avc: denied { mac_admin } for pid=1612 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:38.071743 kubelet[1612]: E0515 10:04:38.071306 1612 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:04:38.071743 kubelet[1612]: I0515 10:04:38.071507 1612 volume_manager.go:289] "Starting Kubelet Volume Manager" May 15 10:04:38.071825 kubelet[1612]: I0515 10:04:38.071786 1612 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 15 10:04:38.071894 kubelet[1612]: I0515 10:04:38.071871 1612 reconciler.go:26] "Reconciler: start to sync state" May 15 10:04:38.072764 kubelet[1612]: I0515 10:04:38.072735 1612 factory.go:221] Registration of the systemd container factory successfully May 15 10:04:38.072896 kubelet[1612]: I0515 10:04:38.072875 1612 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:04:38.061000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:04:38.074299 kernel: audit: type=1401 audit(1747303478.061:423): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:04:38.074355 kernel: audit: type=1300 audit(1747303478.061:423): arch=c00000b7 syscall=5 success=no exit=-22 a0=40005175c0 a1=4000519d58 a2=40006e7e00 a3=25 items=0 ppid=1 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.061000 audit[1612]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40005175c0 a1=4000519d58 a2=40006e7e00 a3=25 items=0 ppid=1 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.076064 kubelet[1612]: W0515 10:04:38.076007 1612 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.18:6443: connect: connection refused May 15 10:04:38.076183 kubelet[1612]: E0515 10:04:38.076071 1612 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 15 10:04:38.061000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:04:38.077234 kubelet[1612]: E0515 10:04:38.077206 1612 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:04:38.077307 kubelet[1612]: E0515 10:04:38.077286 1612 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.18:6443: connect: connection refused" interval="200ms" May 15 10:04:38.077419 kubelet[1612]: I0515 10:04:38.077395 1612 factory.go:221] Registration of the containerd container factory successfully May 15 10:04:38.079731 kernel: audit: type=1327 audit(1747303478.061:423): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:04:38.079792 kernel: audit: type=1325 audit(1747303478.064:424): table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1624 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:38.064000 audit[1624]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1624 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:38.081135 kernel: audit: type=1300 audit(1747303478.064:424): arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff6119970 a2=0 a3=1 items=0 ppid=1612 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.064000 audit[1624]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff6119970 a2=0 a3=1 items=0 ppid=1612 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.082942 kubelet[1612]: E0515 10:04:38.075942 1612 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.18:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.18:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183fab4174a8fb99 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 10:04:38.061497241 +0000 UTC m=+1.183208161,LastTimestamp:2025-05-15 10:04:38.061497241 +0000 UTC m=+1.183208161,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 10:04:38.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:04:38.066000 audit[1625]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:38.066000 audit[1625]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea911f20 a2=0 a3=1 items=0 ppid=1612 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.066000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:04:38.068000 audit[1627]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:38.068000 audit[1627]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc1a4d270 a2=0 a3=1 items=0 ppid=1612 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.068000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:04:38.070000 audit[1629]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:38.070000 audit[1629]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcccb07b0 a2=0 a3=1 items=0 ppid=1612 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:04:38.083000 audit[1634]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1634 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:38.083000 audit[1634]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffc03cf6d0 a2=0 a3=1 items=0 ppid=1612 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 10:04:38.085508 kubelet[1612]: I0515 10:04:38.085470 1612 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:04:38.085000 audit[1636]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1636 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:38.085000 audit[1636]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc1e5d900 a2=0 a3=1 items=0 ppid=1612 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.085000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:04:38.086613 kubelet[1612]: I0515 10:04:38.086595 1612 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:04:38.086684 kubelet[1612]: I0515 10:04:38.086672 1612 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 10:04:38.086747 kubelet[1612]: I0515 10:04:38.086738 1612 kubelet.go:2321] "Starting kubelet main sync loop" May 15 10:04:38.086844 kubelet[1612]: E0515 10:04:38.086826 1612 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:04:38.087750 kubelet[1612]: W0515 10:04:38.087714 1612 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.18:6443: connect: connection refused May 15 10:04:38.086000 audit[1638]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1638 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:38.086000 audit[1638]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe5b896c0 a2=0 a3=1 items=0 ppid=1612 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.086000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:04:38.088197 kubelet[1612]: E0515 10:04:38.088172 1612 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 15 10:04:38.087000 audit[1639]: NETFILTER_CFG table=nat:33 family=10 entries=2 op=nft_register_chain pid=1639 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:38.087000 audit[1639]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff3dae1d0 a2=0 a3=1 items=0 ppid=1612 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.087000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:04:38.087000 audit[1637]: NETFILTER_CFG table=mangle:34 family=2 entries=1 op=nft_register_chain pid=1637 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:38.087000 audit[1637]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe1615ae0 a2=0 a3=1 items=0 ppid=1612 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:04:38.089000 audit[1642]: NETFILTER_CFG table=filter:35 family=10 entries=2 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:38.089000 audit[1642]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd66e0dc0 a2=0 a3=1 items=0 ppid=1612 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.089000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:04:38.089000 audit[1643]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:38.089000 audit[1643]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe4b937e0 a2=0 a3=1 items=0 ppid=1612 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:04:38.090000 audit[1644]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:38.090000 audit[1644]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc1d71750 a2=0 a3=1 items=0 ppid=1612 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.090000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:04:38.092473 kubelet[1612]: I0515 10:04:38.092452 1612 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 10:04:38.092557 kubelet[1612]: I0515 10:04:38.092546 1612 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 10:04:38.092628 kubelet[1612]: I0515 10:04:38.092618 1612 state_mem.go:36] "Initialized new in-memory state store" May 15 10:04:38.151532 kubelet[1612]: I0515 10:04:38.151504 1612 policy_none.go:49] "None policy: Start" May 15 10:04:38.152565 kubelet[1612]: I0515 10:04:38.152544 1612 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 10:04:38.152658 kubelet[1612]: I0515 10:04:38.152574 1612 state_mem.go:35] "Initializing new in-memory state store" May 15 10:04:38.157574 systemd[1]: Created slice kubepods.slice. May 15 10:04:38.161489 systemd[1]: Created slice kubepods-burstable.slice. May 15 10:04:38.163897 systemd[1]: Created slice kubepods-besteffort.slice. May 15 10:04:38.171706 kubelet[1612]: E0515 10:04:38.171673 1612 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:04:38.177069 kubelet[1612]: I0515 10:04:38.177047 1612 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:04:38.175000 audit[1612]: AVC avc: denied { mac_admin } for pid=1612 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:38.175000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:04:38.175000 audit[1612]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000987830 a1=4000862420 a2=4000987800 a3=25 items=0 ppid=1 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:38.175000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:04:38.177319 kubelet[1612]: I0515 10:04:38.177135 1612 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:04:38.177319 kubelet[1612]: I0515 10:04:38.177250 1612 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 10:04:38.177319 kubelet[1612]: I0515 10:04:38.177283 1612 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:04:38.177871 kubelet[1612]: I0515 10:04:38.177657 1612 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:04:38.178763 kubelet[1612]: E0515 10:04:38.178743 1612 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 15 10:04:38.193782 systemd[1]: Created slice kubepods-burstable-pod6a98046d69f0d927c7738c322958a964.slice. May 15 10:04:38.204080 systemd[1]: Created slice kubepods-burstable-podd4a6b755cb4739fbca401212ebb82b6d.slice. May 15 10:04:38.207399 systemd[1]: Created slice kubepods-burstable-pod0613557c150e4f35d1f3f822b5f32ff1.slice. May 15 10:04:38.278379 kubelet[1612]: E0515 10:04:38.278247 1612 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.18:6443: connect: connection refused" interval="400ms" May 15 10:04:38.279934 kubelet[1612]: I0515 10:04:38.279886 1612 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 10:04:38.280346 kubelet[1612]: E0515 10:04:38.280322 1612 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.18:6443/api/v1/nodes\": dial tcp 10.0.0.18:6443: connect: connection refused" node="localhost" May 15 10:04:38.373880 kubelet[1612]: I0515 10:04:38.373846 1612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 15 10:04:38.374157 kubelet[1612]: I0515 10:04:38.374136 1612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6a98046d69f0d927c7738c322958a964-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"6a98046d69f0d927c7738c322958a964\") " pod="kube-system/kube-apiserver-localhost" May 15 10:04:38.374288 kubelet[1612]: I0515 10:04:38.374250 1612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6a98046d69f0d927c7738c322958a964-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"6a98046d69f0d927c7738c322958a964\") " pod="kube-system/kube-apiserver-localhost" May 15 10:04:38.374398 kubelet[1612]: I0515 10:04:38.374385 1612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:04:38.374521 kubelet[1612]: I0515 10:04:38.374507 1612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:04:38.374705 kubelet[1612]: I0515 10:04:38.374691 1612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:04:38.374814 kubelet[1612]: I0515 10:04:38.374800 1612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6a98046d69f0d927c7738c322958a964-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"6a98046d69f0d927c7738c322958a964\") " pod="kube-system/kube-apiserver-localhost" May 15 10:04:38.374918 kubelet[1612]: I0515 10:04:38.374905 1612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:04:38.375025 kubelet[1612]: I0515 10:04:38.375012 1612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:04:38.482337 kubelet[1612]: I0515 10:04:38.482305 1612 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 10:04:38.482696 kubelet[1612]: E0515 10:04:38.482671 1612 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.18:6443/api/v1/nodes\": dial tcp 10.0.0.18:6443: connect: connection refused" node="localhost" May 15 10:04:38.503022 kubelet[1612]: E0515 10:04:38.503000 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:38.504027 env[1216]: time="2025-05-15T10:04:38.503752446Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:6a98046d69f0d927c7738c322958a964,Namespace:kube-system,Attempt:0,}" May 15 10:04:38.506701 kubelet[1612]: E0515 10:04:38.506680 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:38.507048 env[1216]: time="2025-05-15T10:04:38.507012740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,}" May 15 10:04:38.509424 kubelet[1612]: E0515 10:04:38.509402 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:38.509830 env[1216]: time="2025-05-15T10:04:38.509799168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,}" May 15 10:04:38.678752 kubelet[1612]: E0515 10:04:38.678642 1612 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.18:6443: connect: connection refused" interval="800ms" May 15 10:04:38.883901 kubelet[1612]: I0515 10:04:38.883863 1612 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 10:04:38.884202 kubelet[1612]: E0515 10:04:38.884166 1612 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.18:6443/api/v1/nodes\": dial tcp 10.0.0.18:6443: connect: connection refused" node="localhost" May 15 10:04:38.981561 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1226114984.mount: Deactivated successfully. May 15 10:04:38.985096 env[1216]: time="2025-05-15T10:04:38.985047441Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:38.987954 env[1216]: time="2025-05-15T10:04:38.987915773Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:38.989414 env[1216]: time="2025-05-15T10:04:38.989383070Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:38.991065 env[1216]: time="2025-05-15T10:04:38.991031903Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:38.992770 env[1216]: time="2025-05-15T10:04:38.992738634Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:38.994454 env[1216]: time="2025-05-15T10:04:38.994423359Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:38.997524 env[1216]: time="2025-05-15T10:04:38.997481831Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:39.000042 env[1216]: time="2025-05-15T10:04:39.000010698Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:39.002361 env[1216]: time="2025-05-15T10:04:39.002331098Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:39.003039 env[1216]: time="2025-05-15T10:04:39.003010603Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:39.003858 env[1216]: time="2025-05-15T10:04:39.003826505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:39.004930 env[1216]: time="2025-05-15T10:04:39.004877552Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:39.033988 env[1216]: time="2025-05-15T10:04:39.033814512Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:04:39.033988 env[1216]: time="2025-05-15T10:04:39.033859084Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:04:39.033988 env[1216]: time="2025-05-15T10:04:39.033868887Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:04:39.034205 env[1216]: time="2025-05-15T10:04:39.034103031Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e999e6590ae10942134d79b71d451d0a4118f0cfe2ecfec7ae0e12dba77e06f1 pid=1668 runtime=io.containerd.runc.v2 May 15 10:04:39.034496 env[1216]: time="2025-05-15T10:04:39.034452046Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:04:39.034582 env[1216]: time="2025-05-15T10:04:39.034448925Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:04:39.034582 env[1216]: time="2025-05-15T10:04:39.034483535Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:04:39.034582 env[1216]: time="2025-05-15T10:04:39.034493577Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:04:39.034720 env[1216]: time="2025-05-15T10:04:39.034594925Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e708d5be1226dc68020ee6dd82676a1a05bb150b8a170a3a46577e374ecd8373 pid=1669 runtime=io.containerd.runc.v2 May 15 10:04:39.034831 env[1216]: time="2025-05-15T10:04:39.034799541Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:04:39.034918 env[1216]: time="2025-05-15T10:04:39.034897367Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:04:39.035693 env[1216]: time="2025-05-15T10:04:39.035636088Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c0db5d92a1c5b2b30c4caf25d14ed47cef15a1a2419e21e9c30cbe8894700492 pid=1670 runtime=io.containerd.runc.v2 May 15 10:04:39.053211 kubelet[1612]: W0515 10:04:39.046697 1612 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.18:6443: connect: connection refused May 15 10:04:39.053211 kubelet[1612]: E0515 10:04:39.046756 1612 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 15 10:04:39.047384 systemd[1]: Started cri-containerd-c0db5d92a1c5b2b30c4caf25d14ed47cef15a1a2419e21e9c30cbe8894700492.scope. May 15 10:04:39.048250 systemd[1]: Started cri-containerd-e999e6590ae10942134d79b71d451d0a4118f0cfe2ecfec7ae0e12dba77e06f1.scope. May 15 10:04:39.068824 systemd[1]: Started cri-containerd-e708d5be1226dc68020ee6dd82676a1a05bb150b8a170a3a46577e374ecd8373.scope. May 15 10:04:39.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.100000 audit: BPF prog-id=55 op=LOAD May 15 10:04:39.102000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.102000 audit[1700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1670 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330646235643932613163356232623330633463616632356431346564 May 15 10:04:39.102000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.102000 audit[1700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1670 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330646235643932613163356232623330633463616632356431346564 May 15 10:04:39.102000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.102000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.102000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.102000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.102000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.102000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.102000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.102000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.102000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.102000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.102000 audit: BPF prog-id=56 op=LOAD May 15 10:04:39.102000 audit[1700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1670 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330646235643932613163356232623330633463616632356431346564 May 15 10:04:39.103000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.103000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.103000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.103000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.103000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.103000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.103000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.103000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.103000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.103000 audit: BPF prog-id=57 op=LOAD May 15 10:04:39.103000 audit[1700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1670 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330646235643932613163356232623330633463616632356431346564 May 15 10:04:39.104000 audit: BPF prog-id=57 op=UNLOAD May 15 10:04:39.104000 audit: BPF prog-id=56 op=UNLOAD May 15 10:04:39.104000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.104000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.105000 audit: BPF prog-id=58 op=LOAD May 15 10:04:39.104000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.104000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.104000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.104000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.104000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.104000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.104000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.104000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.104000 audit: BPF prog-id=59 op=LOAD May 15 10:04:39.104000 audit[1700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1670 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330646235643932613163356232623330633463616632356431346564 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1669 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537303864356265313232366463363830323065653664643832363736 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1669 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537303864356265313232366463363830323065653664643832363736 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit: BPF prog-id=60 op=LOAD May 15 10:04:39.106000 audit[1699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1669 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537303864356265313232366463363830323065653664643832363736 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit: BPF prog-id=61 op=LOAD May 15 10:04:39.106000 audit[1699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1669 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537303864356265313232366463363830323065653664643832363736 May 15 10:04:39.106000 audit: BPF prog-id=61 op=UNLOAD May 15 10:04:39.106000 audit: BPF prog-id=60 op=UNLOAD May 15 10:04:39.106000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.106000 audit: BPF prog-id=62 op=LOAD May 15 10:04:39.106000 audit[1699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1669 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537303864356265313232366463363830323065653664643832363736 May 15 10:04:39.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.109000 audit: BPF prog-id=63 op=LOAD May 15 10:04:39.110000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1668 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539393965363539306165313039343231333464373962373164343531 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1668 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539393965363539306165313039343231333464373962373164343531 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit: BPF prog-id=64 op=LOAD May 15 10:04:39.110000 audit[1698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1668 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539393965363539306165313039343231333464373962373164343531 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit: BPF prog-id=65 op=LOAD May 15 10:04:39.110000 audit[1698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1668 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539393965363539306165313039343231333464373962373164343531 May 15 10:04:39.110000 audit: BPF prog-id=65 op=UNLOAD May 15 10:04:39.110000 audit: BPF prog-id=64 op=UNLOAD May 15 10:04:39.110000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.110000 audit: BPF prog-id=66 op=LOAD May 15 10:04:39.110000 audit[1698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1668 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539393965363539306165313039343231333464373962373164343531 May 15 10:04:39.134368 env[1216]: time="2025-05-15T10:04:39.132379716Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:6a98046d69f0d927c7738c322958a964,Namespace:kube-system,Attempt:0,} returns sandbox id \"e999e6590ae10942134d79b71d451d0a4118f0cfe2ecfec7ae0e12dba77e06f1\"" May 15 10:04:39.135291 kubelet[1612]: E0515 10:04:39.135093 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:39.136625 env[1216]: time="2025-05-15T10:04:39.136548331Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,} returns sandbox id \"e708d5be1226dc68020ee6dd82676a1a05bb150b8a170a3a46577e374ecd8373\"" May 15 10:04:39.137303 kubelet[1612]: E0515 10:04:39.137124 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:39.137385 env[1216]: time="2025-05-15T10:04:39.137199868Z" level=info msg="CreateContainer within sandbox \"e999e6590ae10942134d79b71d451d0a4118f0cfe2ecfec7ae0e12dba77e06f1\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 15 10:04:39.138734 env[1216]: time="2025-05-15T10:04:39.138689874Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,} returns sandbox id \"c0db5d92a1c5b2b30c4caf25d14ed47cef15a1a2419e21e9c30cbe8894700492\"" May 15 10:04:39.139061 env[1216]: time="2025-05-15T10:04:39.139026526Z" level=info msg="CreateContainer within sandbox \"e708d5be1226dc68020ee6dd82676a1a05bb150b8a170a3a46577e374ecd8373\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 15 10:04:39.139345 kubelet[1612]: E0515 10:04:39.139318 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:39.140830 env[1216]: time="2025-05-15T10:04:39.140798248Z" level=info msg="CreateContainer within sandbox \"c0db5d92a1c5b2b30c4caf25d14ed47cef15a1a2419e21e9c30cbe8894700492\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 15 10:04:39.155182 env[1216]: time="2025-05-15T10:04:39.155115387Z" level=info msg="CreateContainer within sandbox \"e999e6590ae10942134d79b71d451d0a4118f0cfe2ecfec7ae0e12dba77e06f1\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"bf37cb841930114b18b0bc7ebe58eb8899e49d3de40cc26204b3daf28ab189f0\"" May 15 10:04:39.155893 env[1216]: time="2025-05-15T10:04:39.155848787Z" level=info msg="StartContainer for \"bf37cb841930114b18b0bc7ebe58eb8899e49d3de40cc26204b3daf28ab189f0\"" May 15 10:04:39.161617 env[1216]: time="2025-05-15T10:04:39.160979664Z" level=info msg="CreateContainer within sandbox \"c0db5d92a1c5b2b30c4caf25d14ed47cef15a1a2419e21e9c30cbe8894700492\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"f102a909535eb0fb9b79d374eee2b5dba303b13989c162476ade68edc7bd617b\"" May 15 10:04:39.161617 env[1216]: time="2025-05-15T10:04:39.161471838Z" level=info msg="StartContainer for \"f102a909535eb0fb9b79d374eee2b5dba303b13989c162476ade68edc7bd617b\"" May 15 10:04:39.164752 env[1216]: time="2025-05-15T10:04:39.164700398Z" level=info msg="CreateContainer within sandbox \"e708d5be1226dc68020ee6dd82676a1a05bb150b8a170a3a46577e374ecd8373\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"ed6ef86947e893786b67cd9cbfdd9027d09c55c44beab64bdc43931268182212\"" May 15 10:04:39.165316 env[1216]: time="2025-05-15T10:04:39.165282556Z" level=info msg="StartContainer for \"ed6ef86947e893786b67cd9cbfdd9027d09c55c44beab64bdc43931268182212\"" May 15 10:04:39.174972 systemd[1]: Started cri-containerd-bf37cb841930114b18b0bc7ebe58eb8899e49d3de40cc26204b3daf28ab189f0.scope. May 15 10:04:39.186340 systemd[1]: Started cri-containerd-f102a909535eb0fb9b79d374eee2b5dba303b13989c162476ade68edc7bd617b.scope. May 15 10:04:39.188410 systemd[1]: Started cri-containerd-ed6ef86947e893786b67cd9cbfdd9027d09c55c44beab64bdc43931268182212.scope. May 15 10:04:39.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.230000 audit: BPF prog-id=67 op=LOAD May 15 10:04:39.230000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.230000 audit[1802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1670 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303261393039353335656230666239623739643337346565653262 May 15 10:04:39.230000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.230000 audit[1802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1670 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303261393039353335656230666239623739643337346565653262 May 15 10:04:39.230000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.230000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.230000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.230000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.230000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.230000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.230000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.230000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.230000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.230000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.230000 audit: BPF prog-id=68 op=LOAD May 15 10:04:39.230000 audit[1802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1670 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303261393039353335656230666239623739643337346565653262 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit: BPF prog-id=69 op=LOAD May 15 10:04:39.231000 audit[1802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1670 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303261393039353335656230666239623739643337346565653262 May 15 10:04:39.231000 audit: BPF prog-id=69 op=UNLOAD May 15 10:04:39.231000 audit: BPF prog-id=68 op=UNLOAD May 15 10:04:39.231000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.231000 audit: BPF prog-id=70 op=LOAD May 15 10:04:39.231000 audit[1802]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1670 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303261393039353335656230666239623739643337346565653262 May 15 10:04:39.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit: BPF prog-id=71 op=LOAD May 15 10:04:39.248000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1668 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266333763623834313933303131346231386230626337656265353865 May 15 10:04:39.248000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1668 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266333763623834313933303131346231386230626337656265353865 May 15 10:04:39.248000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.248000 audit: BPF prog-id=72 op=LOAD May 15 10:04:39.248000 audit[1779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1668 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266333763623834313933303131346231386230626337656265353865 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit: BPF prog-id=73 op=LOAD May 15 10:04:39.249000 audit[1779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1668 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266333763623834313933303131346231386230626337656265353865 May 15 10:04:39.249000 audit: BPF prog-id=73 op=UNLOAD May 15 10:04:39.249000 audit: BPF prog-id=72 op=UNLOAD May 15 10:04:39.249000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.249000 audit: BPF prog-id=74 op=LOAD May 15 10:04:39.249000 audit[1779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1668 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266333763623834313933303131346231386230626337656265353865 May 15 10:04:39.258194 kubelet[1612]: W0515 10:04:39.258087 1612 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.18:6443: connect: connection refused May 15 10:04:39.258194 kubelet[1612]: E0515 10:04:39.258157 1612 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 15 10:04:39.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.258000 audit: BPF prog-id=75 op=LOAD May 15 10:04:39.259000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.259000 audit[1805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1669 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564366566383639343765383933373836623637636439636266646439 May 15 10:04:39.259000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.259000 audit[1805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1669 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564366566383639343765383933373836623637636439636266646439 May 15 10:04:39.259000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.259000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.259000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.259000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.259000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.259000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.259000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.259000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.259000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.259000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.259000 audit: BPF prog-id=76 op=LOAD May 15 10:04:39.259000 audit[1805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1669 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564366566383639343765383933373836623637636439636266646439 May 15 10:04:39.260000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.260000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.260000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.260000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.260000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.260000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.260000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.260000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.260000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.260000 audit: BPF prog-id=77 op=LOAD May 15 10:04:39.260000 audit[1805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1669 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564366566383639343765383933373836623637636439636266646439 May 15 10:04:39.261000 audit: BPF prog-id=77 op=UNLOAD May 15 10:04:39.261000 audit: BPF prog-id=76 op=UNLOAD May 15 10:04:39.261000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.261000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.261000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.261000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.261000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.261000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.261000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.261000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.261000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.261000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:39.261000 audit: BPF prog-id=78 op=LOAD May 15 10:04:39.261000 audit[1805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1669 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:39.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564366566383639343765383933373836623637636439636266646439 May 15 10:04:39.263246 kubelet[1612]: W0515 10:04:39.262801 1612 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.18:6443: connect: connection refused May 15 10:04:39.263246 kubelet[1612]: E0515 10:04:39.262882 1612 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 15 10:04:39.280206 env[1216]: time="2025-05-15T10:04:39.280163603Z" level=info msg="StartContainer for \"f102a909535eb0fb9b79d374eee2b5dba303b13989c162476ade68edc7bd617b\" returns successfully" May 15 10:04:39.296389 env[1216]: time="2025-05-15T10:04:39.296348171Z" level=info msg="StartContainer for \"ed6ef86947e893786b67cd9cbfdd9027d09c55c44beab64bdc43931268182212\" returns successfully" May 15 10:04:39.306479 env[1216]: time="2025-05-15T10:04:39.297371009Z" level=info msg="StartContainer for \"bf37cb841930114b18b0bc7ebe58eb8899e49d3de40cc26204b3daf28ab189f0\" returns successfully" May 15 10:04:39.479926 kubelet[1612]: E0515 10:04:39.479842 1612 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.18:6443: connect: connection refused" interval="1.6s" May 15 10:04:39.685853 kubelet[1612]: I0515 10:04:39.685751 1612 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 10:04:40.094708 kubelet[1612]: E0515 10:04:40.094609 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:40.096974 kubelet[1612]: E0515 10:04:40.096946 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:40.098605 kubelet[1612]: E0515 10:04:40.098576 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:41.100268 kubelet[1612]: E0515 10:04:41.100218 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:41.429552 kubelet[1612]: E0515 10:04:41.429457 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:41.453000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:04:41.453000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:04:41.453000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000476060 a2=fc6 a3=0 items=0 ppid=1669 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 key=(null) May 15 10:04:41.453000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:04:41.453000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=400055a000 a2=fc6 a3=0 items=0 ppid=1669 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 key=(null) May 15 10:04:41.453000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:04:41.504000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:04:41.504000 audit[1823]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4004684000 a2=fc6 a3=0 items=0 ppid=1668 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 key=(null) May 15 10:04:41.504000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:04:41.504000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:04:41.504000 audit[1823]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4007596900 a2=fc6 a3=0 items=0 ppid=1668 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 key=(null) May 15 10:04:41.504000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:04:41.504000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:04:41.504000 audit[1823]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4004684180 a2=fc6 a3=0 items=0 ppid=1668 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 key=(null) May 15 10:04:41.504000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:04:41.507000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7294 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:04:41.507000 audit[1823]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=400532c720 a2=fc6 a3=0 items=0 ppid=1668 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 key=(null) May 15 10:04:41.507000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:04:41.507000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:04:41.507000 audit[1823]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=4001fb9940 a2=fc6 a3=0 items=0 ppid=1668 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 key=(null) May 15 10:04:41.507000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:04:41.507000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:04:41.507000 audit[1823]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=400532c930 a2=fc6 a3=0 items=0 ppid=1668 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 key=(null) May 15 10:04:41.507000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:04:41.570479 kubelet[1612]: E0515 10:04:41.570427 1612 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 15 10:04:41.653402 kubelet[1612]: I0515 10:04:41.653352 1612 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 15 10:04:42.050745 kubelet[1612]: I0515 10:04:42.050709 1612 apiserver.go:52] "Watching apiserver" May 15 10:04:42.071957 kubelet[1612]: I0515 10:04:42.071915 1612 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 15 10:04:43.845560 systemd[1]: Reloading. May 15 10:04:43.900940 kubelet[1612]: E0515 10:04:43.900910 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:43.917634 /usr/lib/systemd/system-generators/torcx-generator[1909]: time="2025-05-15T10:04:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:04:43.917662 /usr/lib/systemd/system-generators/torcx-generator[1909]: time="2025-05-15T10:04:43Z" level=info msg="torcx already run" May 15 10:04:43.974443 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:04:43.974462 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:04:43.989851 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:04:44.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.059816 kernel: kauditd_printk_skb: 404 callbacks suppressed May 15 10:04:44.059884 kernel: audit: type=1400 audit(1747303484.056:553): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.059906 kernel: audit: type=1400 audit(1747303484.056:554): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.061509 kernel: audit: type=1400 audit(1747303484.056:555): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.063188 kernel: audit: type=1400 audit(1747303484.056:556): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.066688 kernel: audit: type=1400 audit(1747303484.056:557): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.066749 kernel: audit: type=1400 audit(1747303484.056:558): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.068365 kernel: audit: type=1400 audit(1747303484.056:559): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.070074 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 15 10:04:44.070165 kernel: audit: type=1400 audit(1747303484.056:560): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.070193 kernel: audit: type=1400 audit(1747303484.056:561): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.058000 audit: BPF prog-id=79 op=LOAD May 15 10:04:44.058000 audit: BPF prog-id=67 op=UNLOAD May 15 10:04:44.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.060000 audit: BPF prog-id=80 op=LOAD May 15 10:04:44.060000 audit: BPF prog-id=40 op=UNLOAD May 15 10:04:44.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.062000 audit: BPF prog-id=81 op=LOAD May 15 10:04:44.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.063000 audit: BPF prog-id=82 op=LOAD May 15 10:04:44.063000 audit: BPF prog-id=41 op=UNLOAD May 15 10:04:44.063000 audit: BPF prog-id=42 op=UNLOAD May 15 10:04:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.065000 audit: BPF prog-id=83 op=LOAD May 15 10:04:44.065000 audit: BPF prog-id=55 op=UNLOAD May 15 10:04:44.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.067000 audit: BPF prog-id=84 op=LOAD May 15 10:04:44.067000 audit: BPF prog-id=43 op=UNLOAD May 15 10:04:44.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.072000 audit: BPF prog-id=44 op=UNLOAD May 15 10:04:44.072000 audit: BPF prog-id=45 op=UNLOAD May 15 10:04:44.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit: BPF prog-id=87 op=LOAD May 15 10:04:44.073000 audit: BPF prog-id=71 op=UNLOAD May 15 10:04:44.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.073000 audit: BPF prog-id=88 op=LOAD May 15 10:04:44.073000 audit: BPF prog-id=46 op=UNLOAD May 15 10:04:44.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.076000 audit: BPF prog-id=89 op=LOAD May 15 10:04:44.076000 audit: BPF prog-id=75 op=UNLOAD May 15 10:04:44.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.076000 audit: BPF prog-id=90 op=LOAD May 15 10:04:44.076000 audit: BPF prog-id=47 op=UNLOAD May 15 10:04:44.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.077000 audit: BPF prog-id=91 op=LOAD May 15 10:04:44.077000 audit: BPF prog-id=63 op=UNLOAD May 15 10:04:44.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit: BPF prog-id=92 op=LOAD May 15 10:04:44.078000 audit: BPF prog-id=48 op=UNLOAD May 15 10:04:44.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit: BPF prog-id=93 op=LOAD May 15 10:04:44.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit: BPF prog-id=94 op=LOAD May 15 10:04:44.078000 audit: BPF prog-id=49 op=UNLOAD May 15 10:04:44.078000 audit: BPF prog-id=50 op=UNLOAD May 15 10:04:44.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit: BPF prog-id=95 op=LOAD May 15 10:04:44.079000 audit: BPF prog-id=51 op=UNLOAD May 15 10:04:44.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit: BPF prog-id=96 op=LOAD May 15 10:04:44.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.079000 audit: BPF prog-id=97 op=LOAD May 15 10:04:44.079000 audit: BPF prog-id=52 op=UNLOAD May 15 10:04:44.079000 audit: BPF prog-id=53 op=UNLOAD May 15 10:04:44.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit: BPF prog-id=98 op=LOAD May 15 10:04:44.080000 audit: BPF prog-id=58 op=UNLOAD May 15 10:04:44.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.080000 audit: BPF prog-id=99 op=LOAD May 15 10:04:44.080000 audit: BPF prog-id=54 op=UNLOAD May 15 10:04:44.097184 systemd[1]: Stopping kubelet.service... May 15 10:04:44.124595 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:04:44.124801 systemd[1]: Stopped kubelet.service. May 15 10:04:44.124860 systemd[1]: kubelet.service: Consumed 1.553s CPU time. May 15 10:04:44.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:44.126494 systemd[1]: Starting kubelet.service... May 15 10:04:44.209455 systemd[1]: Started kubelet.service. May 15 10:04:44.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:44.250358 kubelet[1951]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:04:44.250679 kubelet[1951]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 10:04:44.250724 kubelet[1951]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:04:44.252546 kubelet[1951]: I0515 10:04:44.252454 1951 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:04:44.262992 kubelet[1951]: I0515 10:04:44.262920 1951 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 15 10:04:44.262992 kubelet[1951]: I0515 10:04:44.262948 1951 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:04:44.263165 kubelet[1951]: I0515 10:04:44.263148 1951 server.go:929] "Client rotation is on, will bootstrap in background" May 15 10:04:44.264506 kubelet[1951]: I0515 10:04:44.264482 1951 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 15 10:04:44.266333 kubelet[1951]: I0515 10:04:44.266301 1951 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:04:44.269541 kubelet[1951]: E0515 10:04:44.269473 1951 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 10:04:44.269613 kubelet[1951]: I0515 10:04:44.269541 1951 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 10:04:44.272275 kubelet[1951]: I0515 10:04:44.272239 1951 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:04:44.272386 kubelet[1951]: I0515 10:04:44.272371 1951 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 15 10:04:44.272509 kubelet[1951]: I0515 10:04:44.272479 1951 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:04:44.272766 kubelet[1951]: I0515 10:04:44.272505 1951 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 10:04:44.272860 kubelet[1951]: I0515 10:04:44.272770 1951 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:04:44.272860 kubelet[1951]: I0515 10:04:44.272780 1951 container_manager_linux.go:300] "Creating device plugin manager" May 15 10:04:44.272860 kubelet[1951]: I0515 10:04:44.272822 1951 state_mem.go:36] "Initialized new in-memory state store" May 15 10:04:44.272934 kubelet[1951]: I0515 10:04:44.272913 1951 kubelet.go:408] "Attempting to sync node with API server" May 15 10:04:44.272934 kubelet[1951]: I0515 10:04:44.272924 1951 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:04:44.272975 kubelet[1951]: I0515 10:04:44.272949 1951 kubelet.go:314] "Adding apiserver pod source" May 15 10:04:44.272975 kubelet[1951]: I0515 10:04:44.272958 1951 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:04:44.274223 kubelet[1951]: I0515 10:04:44.274188 1951 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:04:44.274779 kubelet[1951]: I0515 10:04:44.274752 1951 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:04:44.275274 kubelet[1951]: I0515 10:04:44.275245 1951 server.go:1269] "Started kubelet" May 15 10:04:44.278649 kubelet[1951]: I0515 10:04:44.278613 1951 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:04:44.280004 kubelet[1951]: I0515 10:04:44.279940 1951 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:04:44.280388 kubelet[1951]: I0515 10:04:44.280359 1951 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:04:44.281686 kubelet[1951]: I0515 10:04:44.281661 1951 server.go:460] "Adding debug handlers to kubelet server" May 15 10:04:44.282000 audit[1951]: AVC avc: denied { mac_admin } for pid=1951 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.282000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:04:44.282000 audit[1951]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000602e10 a1=4000632630 a2=4000602de0 a3=25 items=0 ppid=1 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:44.282000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:04:44.283000 audit[1951]: AVC avc: denied { mac_admin } for pid=1951 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.283000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:04:44.283000 audit[1951]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40004628c0 a1=4000632648 a2=4000602ea0 a3=25 items=0 ppid=1 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:44.283000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:04:44.284606 kubelet[1951]: I0515 10:04:44.284248 1951 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:04:44.284606 kubelet[1951]: I0515 10:04:44.284297 1951 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 10:04:44.284606 kubelet[1951]: E0515 10:04:44.284318 1951 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:04:44.284606 kubelet[1951]: I0515 10:04:44.284322 1951 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:04:44.284606 kubelet[1951]: I0515 10:04:44.284433 1951 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 10:04:44.286597 kubelet[1951]: I0515 10:04:44.286574 1951 volume_manager.go:289] "Starting Kubelet Volume Manager" May 15 10:04:44.286784 kubelet[1951]: I0515 10:04:44.286768 1951 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 15 10:04:44.286933 kubelet[1951]: I0515 10:04:44.286918 1951 reconciler.go:26] "Reconciler: start to sync state" May 15 10:04:44.287594 kubelet[1951]: E0515 10:04:44.287571 1951 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:04:44.288066 kubelet[1951]: I0515 10:04:44.288045 1951 factory.go:221] Registration of the systemd container factory successfully May 15 10:04:44.288163 kubelet[1951]: I0515 10:04:44.288144 1951 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:04:44.289744 kubelet[1951]: I0515 10:04:44.289716 1951 factory.go:221] Registration of the containerd container factory successfully May 15 10:04:44.302757 kubelet[1951]: I0515 10:04:44.302705 1951 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:04:44.303579 kubelet[1951]: I0515 10:04:44.303556 1951 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:04:44.303579 kubelet[1951]: I0515 10:04:44.303575 1951 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 10:04:44.303664 kubelet[1951]: I0515 10:04:44.303592 1951 kubelet.go:2321] "Starting kubelet main sync loop" May 15 10:04:44.303664 kubelet[1951]: E0515 10:04:44.303631 1951 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:04:44.333606 kubelet[1951]: I0515 10:04:44.333574 1951 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 10:04:44.333606 kubelet[1951]: I0515 10:04:44.333594 1951 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 10:04:44.333606 kubelet[1951]: I0515 10:04:44.333614 1951 state_mem.go:36] "Initialized new in-memory state store" May 15 10:04:44.333792 kubelet[1951]: I0515 10:04:44.333753 1951 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 15 10:04:44.333792 kubelet[1951]: I0515 10:04:44.333763 1951 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 15 10:04:44.333792 kubelet[1951]: I0515 10:04:44.333779 1951 policy_none.go:49] "None policy: Start" May 15 10:04:44.334304 kubelet[1951]: I0515 10:04:44.334286 1951 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 10:04:44.334385 kubelet[1951]: I0515 10:04:44.334311 1951 state_mem.go:35] "Initializing new in-memory state store" May 15 10:04:44.334451 kubelet[1951]: I0515 10:04:44.334437 1951 state_mem.go:75] "Updated machine memory state" May 15 10:04:44.337928 kubelet[1951]: I0515 10:04:44.337907 1951 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:04:44.337000 audit[1951]: AVC avc: denied { mac_admin } for pid=1951 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:44.337000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:04:44.337000 audit[1951]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a2b260 a1=40009e20a8 a2=4000a2b230 a3=25 items=0 ppid=1 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:44.337000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:04:44.338195 kubelet[1951]: I0515 10:04:44.337958 1951 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:04:44.339624 kubelet[1951]: I0515 10:04:44.339598 1951 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 10:04:44.339688 kubelet[1951]: I0515 10:04:44.339618 1951 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:04:44.339996 kubelet[1951]: I0515 10:04:44.339977 1951 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:04:44.413306 kubelet[1951]: E0515 10:04:44.410114 1951 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 15 10:04:44.443397 kubelet[1951]: I0515 10:04:44.443359 1951 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 10:04:44.450633 kubelet[1951]: I0515 10:04:44.449848 1951 kubelet_node_status.go:111] "Node was previously registered" node="localhost" May 15 10:04:44.450633 kubelet[1951]: I0515 10:04:44.449926 1951 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 15 10:04:44.487403 kubelet[1951]: I0515 10:04:44.487360 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6a98046d69f0d927c7738c322958a964-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"6a98046d69f0d927c7738c322958a964\") " pod="kube-system/kube-apiserver-localhost" May 15 10:04:44.487403 kubelet[1951]: I0515 10:04:44.487399 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6a98046d69f0d927c7738c322958a964-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"6a98046d69f0d927c7738c322958a964\") " pod="kube-system/kube-apiserver-localhost" May 15 10:04:44.487568 kubelet[1951]: I0515 10:04:44.487430 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:04:44.487568 kubelet[1951]: I0515 10:04:44.487456 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:04:44.487568 kubelet[1951]: I0515 10:04:44.487473 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:04:44.487568 kubelet[1951]: I0515 10:04:44.487503 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:04:44.487568 kubelet[1951]: I0515 10:04:44.487521 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:04:44.487708 kubelet[1951]: I0515 10:04:44.487535 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6a98046d69f0d927c7738c322958a964-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"6a98046d69f0d927c7738c322958a964\") " pod="kube-system/kube-apiserver-localhost" May 15 10:04:44.487708 kubelet[1951]: I0515 10:04:44.487582 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 15 10:04:44.709270 kubelet[1951]: E0515 10:04:44.709137 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:44.710438 kubelet[1951]: E0515 10:04:44.710407 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:44.711510 kubelet[1951]: E0515 10:04:44.711479 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:45.279801 kubelet[1951]: I0515 10:04:45.279771 1951 apiserver.go:52] "Watching apiserver" May 15 10:04:45.287565 kubelet[1951]: I0515 10:04:45.287539 1951 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 15 10:04:45.299000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:04:45.299000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40007191e0 a2=fc6 a3=0 items=0 ppid=1669 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 key=(null) May 15 10:04:45.299000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:04:45.299000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:04:45.299000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40007193a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 key=(null) May 15 10:04:45.299000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:04:45.300000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:04:45.300000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000bb6aa0 a2=fc6 a3=0 items=0 ppid=1669 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 key=(null) May 15 10:04:45.300000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:04:45.300000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:04:45.300000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000719560 a2=fc6 a3=0 items=0 ppid=1669 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 key=(null) May 15 10:04:45.300000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:04:45.314247 kubelet[1951]: E0515 10:04:45.314212 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:45.314627 kubelet[1951]: E0515 10:04:45.314608 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:45.320560 kubelet[1951]: E0515 10:04:45.320530 1951 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 15 10:04:45.323174 kubelet[1951]: E0515 10:04:45.323148 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:45.335265 kubelet[1951]: I0515 10:04:45.335196 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.3351628739999999 podStartE2EDuration="1.335162874s" podCreationTimestamp="2025-05-15 10:04:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:04:45.334733219 +0000 UTC m=+1.121974379" watchObservedRunningTime="2025-05-15 10:04:45.335162874 +0000 UTC m=+1.122404034" May 15 10:04:45.342700 kubelet[1951]: I0515 10:04:45.342535 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.342520131 podStartE2EDuration="2.342520131s" podCreationTimestamp="2025-05-15 10:04:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:04:45.34188713 +0000 UTC m=+1.129128290" watchObservedRunningTime="2025-05-15 10:04:45.342520131 +0000 UTC m=+1.129761291" May 15 10:04:45.350562 kubelet[1951]: I0515 10:04:45.350511 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.350496866 podStartE2EDuration="1.350496866s" podCreationTimestamp="2025-05-15 10:04:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:04:45.350404294 +0000 UTC m=+1.137645454" watchObservedRunningTime="2025-05-15 10:04:45.350496866 +0000 UTC m=+1.137738026" May 15 10:04:46.316045 kubelet[1951]: E0515 10:04:46.316014 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:46.456000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 10:04:46.456000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40009ea400 a2=fc6 a3=0 items=0 ppid=1669 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 key=(null) May 15 10:04:46.456000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:04:48.689578 kubelet[1951]: E0515 10:04:48.689545 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:49.127000 audit[1352]: USER_END pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:04:49.129026 sudo[1352]: pam_unix(sudo:session): session closed for user root May 15 10:04:49.129631 kernel: kauditd_printk_skb: 295 callbacks suppressed May 15 10:04:49.129668 kernel: audit: type=1106 audit(1747303489.127:791): pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:04:49.128000 audit[1352]: CRED_DISP pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:04:49.133754 kernel: audit: type=1104 audit(1747303489.128:792): pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:04:49.134528 sshd[1348]: pam_unix(sshd:session): session closed for user core May 15 10:04:49.134000 audit[1348]: USER_END pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:04:49.137585 systemd-logind[1208]: Session 7 logged out. Waiting for processes to exit. May 15 10:04:49.134000 audit[1348]: CRED_DISP pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:04:49.138598 systemd[1]: session-7.scope: Deactivated successfully. May 15 10:04:49.138770 systemd[1]: session-7.scope: Consumed 7.439s CPU time. May 15 10:04:49.139534 systemd[1]: sshd@6-10.0.0.18:22-10.0.0.1:56016.service: Deactivated successfully. May 15 10:04:49.140368 kernel: audit: type=1106 audit(1747303489.134:793): pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:04:49.140413 kernel: audit: type=1104 audit(1747303489.134:794): pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:04:49.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.18:22-10.0.0.1:56016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:49.140675 systemd-logind[1208]: Removed session 7. May 15 10:04:49.142502 kernel: audit: type=1131 audit(1747303489.138:795): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.18:22-10.0.0.1:56016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:04:49.667912 kubelet[1951]: I0515 10:04:49.667852 1951 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 15 10:04:49.668221 env[1216]: time="2025-05-15T10:04:49.668178661Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 10:04:49.668517 kubelet[1951]: I0515 10:04:49.668358 1951 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 15 10:04:49.680033 kubelet[1951]: E0515 10:04:49.679943 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:50.321872 kubelet[1951]: E0515 10:04:50.321832 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:50.721880 systemd[1]: Created slice kubepods-besteffort-poda5e88a16_a4c2_411d_afb7_813ccf2c4b46.slice. May 15 10:04:50.733298 kubelet[1951]: I0515 10:04:50.733244 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a5e88a16-a4c2-411d-afb7-813ccf2c4b46-kube-proxy\") pod \"kube-proxy-wl866\" (UID: \"a5e88a16-a4c2-411d-afb7-813ccf2c4b46\") " pod="kube-system/kube-proxy-wl866" May 15 10:04:50.733494 kubelet[1951]: I0515 10:04:50.733476 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a5e88a16-a4c2-411d-afb7-813ccf2c4b46-lib-modules\") pod \"kube-proxy-wl866\" (UID: \"a5e88a16-a4c2-411d-afb7-813ccf2c4b46\") " pod="kube-system/kube-proxy-wl866" May 15 10:04:50.733612 kubelet[1951]: I0515 10:04:50.733597 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a5e88a16-a4c2-411d-afb7-813ccf2c4b46-xtables-lock\") pod \"kube-proxy-wl866\" (UID: \"a5e88a16-a4c2-411d-afb7-813ccf2c4b46\") " pod="kube-system/kube-proxy-wl866" May 15 10:04:50.733697 kubelet[1951]: I0515 10:04:50.733678 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9p2jq\" (UniqueName: \"kubernetes.io/projected/a5e88a16-a4c2-411d-afb7-813ccf2c4b46-kube-api-access-9p2jq\") pod \"kube-proxy-wl866\" (UID: \"a5e88a16-a4c2-411d-afb7-813ccf2c4b46\") " pod="kube-system/kube-proxy-wl866" May 15 10:04:50.834077 kubelet[1951]: I0515 10:04:50.833943 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pkkdq\" (UniqueName: \"kubernetes.io/projected/ec3c7e57-defa-451b-b499-1b1c91989929-kube-api-access-pkkdq\") pod \"tigera-operator-6f6897fdc5-gmpws\" (UID: \"ec3c7e57-defa-451b-b499-1b1c91989929\") " pod="tigera-operator/tigera-operator-6f6897fdc5-gmpws" May 15 10:04:50.834077 kubelet[1951]: I0515 10:04:50.833992 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ec3c7e57-defa-451b-b499-1b1c91989929-var-lib-calico\") pod \"tigera-operator-6f6897fdc5-gmpws\" (UID: \"ec3c7e57-defa-451b-b499-1b1c91989929\") " pod="tigera-operator/tigera-operator-6f6897fdc5-gmpws" May 15 10:04:50.833970 systemd[1]: Created slice kubepods-besteffort-podec3c7e57_defa_451b_b499_1b1c91989929.slice. May 15 10:04:50.844665 kubelet[1951]: I0515 10:04:50.844632 1951 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 15 10:04:51.033043 kubelet[1951]: E0515 10:04:51.032934 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:51.034169 env[1216]: time="2025-05-15T10:04:51.034121288Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wl866,Uid:a5e88a16-a4c2-411d-afb7-813ccf2c4b46,Namespace:kube-system,Attempt:0,}" May 15 10:04:51.047381 env[1216]: time="2025-05-15T10:04:51.047298654Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:04:51.047381 env[1216]: time="2025-05-15T10:04:51.047337338Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:04:51.047381 env[1216]: time="2025-05-15T10:04:51.047348139Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:04:51.047583 env[1216]: time="2025-05-15T10:04:51.047471710Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b956a51ca09f6472dffbeefe4967e697683afb9c2db27bde6dfce3a86c410bc0 pid=2045 runtime=io.containerd.runc.v2 May 15 10:04:51.066713 systemd[1]: Started cri-containerd-b956a51ca09f6472dffbeefe4967e697683afb9c2db27bde6dfce3a86c410bc0.scope. May 15 10:04:51.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.097581 kernel: audit: type=1400 audit(1747303491.092:796): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.097643 kernel: audit: type=1400 audit(1747303491.092:797): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.097660 kernel: audit: type=1400 audit(1747303491.092:798): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.101273 kernel: audit: type=1400 audit(1747303491.092:799): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.101339 kernel: audit: type=1400 audit(1747303491.092:800): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.094000 audit: BPF prog-id=100 op=LOAD May 15 10:04:51.097000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.097000 audit[2056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400013db38 a2=10 a3=0 items=0 ppid=2045 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353661353163613039663634373264666662656566653439363765 May 15 10:04:51.097000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.097000 audit[2056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400013d5a0 a2=3c a3=0 items=0 ppid=2045 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353661353163613039663634373264666662656566653439363765 May 15 10:04:51.097000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.097000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.097000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.097000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.097000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.097000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.097000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.097000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.097000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.097000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.097000 audit: BPF prog-id=101 op=LOAD May 15 10:04:51.097000 audit[2056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400013d8e0 a2=78 a3=0 items=0 ppid=2045 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353661353163613039663634373264666662656566653439363765 May 15 10:04:51.098000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.098000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.098000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.098000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.098000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.098000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.098000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.098000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.098000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.098000 audit: BPF prog-id=102 op=LOAD May 15 10:04:51.098000 audit[2056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400013d670 a2=78 a3=0 items=0 ppid=2045 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353661353163613039663634373264666662656566653439363765 May 15 10:04:51.100000 audit: BPF prog-id=102 op=UNLOAD May 15 10:04:51.100000 audit: BPF prog-id=101 op=UNLOAD May 15 10:04:51.100000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.100000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.100000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.100000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.100000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.100000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.100000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.100000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.100000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.100000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.100000 audit: BPF prog-id=103 op=LOAD May 15 10:04:51.100000 audit[2056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400013db40 a2=78 a3=0 items=0 ppid=2045 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353661353163613039663634373264666662656566653439363765 May 15 10:04:51.117283 env[1216]: time="2025-05-15T10:04:51.117214174Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wl866,Uid:a5e88a16-a4c2-411d-afb7-813ccf2c4b46,Namespace:kube-system,Attempt:0,} returns sandbox id \"b956a51ca09f6472dffbeefe4967e697683afb9c2db27bde6dfce3a86c410bc0\"" May 15 10:04:51.119564 kubelet[1951]: E0515 10:04:51.118204 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:51.125444 env[1216]: time="2025-05-15T10:04:51.125384082Z" level=info msg="CreateContainer within sandbox \"b956a51ca09f6472dffbeefe4967e697683afb9c2db27bde6dfce3a86c410bc0\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 10:04:51.137311 env[1216]: time="2025-05-15T10:04:51.137253248Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-gmpws,Uid:ec3c7e57-defa-451b-b499-1b1c91989929,Namespace:tigera-operator,Attempt:0,}" May 15 10:04:51.138678 env[1216]: time="2025-05-15T10:04:51.138634534Z" level=info msg="CreateContainer within sandbox \"b956a51ca09f6472dffbeefe4967e697683afb9c2db27bde6dfce3a86c410bc0\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"95d69267eff2a3f3007e756160d5c04a7e63e669bb77a3a2031ae49a04054d6a\"" May 15 10:04:51.139308 env[1216]: time="2025-05-15T10:04:51.139275233Z" level=info msg="StartContainer for \"95d69267eff2a3f3007e756160d5c04a7e63e669bb77a3a2031ae49a04054d6a\"" May 15 10:04:51.153794 env[1216]: time="2025-05-15T10:04:51.153659830Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:04:51.153794 env[1216]: time="2025-05-15T10:04:51.153755358Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:04:51.153953 env[1216]: time="2025-05-15T10:04:51.153839206Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:04:51.154082 env[1216]: time="2025-05-15T10:04:51.154035824Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/43eb1db83d68e21a354ada768125320ba80196579c1c0d359a48c6179c67973c pid=2101 runtime=io.containerd.runc.v2 May 15 10:04:51.156458 systemd[1]: Started cri-containerd-95d69267eff2a3f3007e756160d5c04a7e63e669bb77a3a2031ae49a04054d6a.scope. May 15 10:04:51.167081 systemd[1]: Started cri-containerd-43eb1db83d68e21a354ada768125320ba80196579c1c0d359a48c6179c67973c.scope. May 15 10:04:51.187000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.187000 audit[2087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2045 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935643639323637656666326133663330303765373536313630643563 May 15 10:04:51.187000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.187000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.187000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.187000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.187000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.187000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.187000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.187000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.187000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.187000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.187000 audit: BPF prog-id=104 op=LOAD May 15 10:04:51.187000 audit[2087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2045 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935643639323637656666326133663330303765373536313630643563 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit: BPF prog-id=105 op=LOAD May 15 10:04:51.188000 audit[2087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2045 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935643639323637656666326133663330303765373536313630643563 May 15 10:04:51.188000 audit: BPF prog-id=105 op=UNLOAD May 15 10:04:51.188000 audit: BPF prog-id=104 op=UNLOAD May 15 10:04:51.188000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.188000 audit: BPF prog-id=106 op=LOAD May 15 10:04:51.188000 audit[2087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2045 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935643639323637656666326133663330303765373536313630643563 May 15 10:04:51.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.198000 audit: BPF prog-id=107 op=LOAD May 15 10:04:51.199000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2101 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433656231646238336436386532316133353461646137363831323533 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2101 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433656231646238336436386532316133353461646137363831323533 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit: BPF prog-id=108 op=LOAD May 15 10:04:51.199000 audit[2116]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2101 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433656231646238336436386532316133353461646137363831323533 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit: BPF prog-id=109 op=LOAD May 15 10:04:51.199000 audit[2116]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2101 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433656231646238336436386532316133353461646137363831323533 May 15 10:04:51.199000 audit: BPF prog-id=109 op=UNLOAD May 15 10:04:51.199000 audit: BPF prog-id=108 op=UNLOAD May 15 10:04:51.199000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:51.199000 audit: BPF prog-id=110 op=LOAD May 15 10:04:51.199000 audit[2116]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2101 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433656231646238336436386532316133353461646137363831323533 May 15 10:04:51.212558 env[1216]: time="2025-05-15T10:04:51.212476613Z" level=info msg="StartContainer for \"95d69267eff2a3f3007e756160d5c04a7e63e669bb77a3a2031ae49a04054d6a\" returns successfully" May 15 10:04:51.224072 env[1216]: time="2025-05-15T10:04:51.224022430Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-gmpws,Uid:ec3c7e57-defa-451b-b499-1b1c91989929,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"43eb1db83d68e21a354ada768125320ba80196579c1c0d359a48c6179c67973c\"" May 15 10:04:51.227713 env[1216]: time="2025-05-15T10:04:51.227670764Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 15 10:04:51.326205 kubelet[1951]: E0515 10:04:51.326099 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:51.385000 audit[2193]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.385000 audit[2193]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffce0419d0 a2=0 a3=1 items=0 ppid=2126 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:04:51.388000 audit[2195]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.388000 audit[2195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc745f120 a2=0 a3=1 items=0 ppid=2126 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.388000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:04:51.389000 audit[2192]: NETFILTER_CFG table=mangle:40 family=2 entries=1 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.389000 audit[2192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdd2232f0 a2=0 a3=1 items=0 ppid=2126 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.389000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:04:51.390000 audit[2196]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.390000 audit[2196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdb5fcfa0 a2=0 a3=1 items=0 ppid=2126 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.390000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:04:51.391000 audit[2197]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.391000 audit[2197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffed0ad990 a2=0 a3=1 items=0 ppid=2126 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.391000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:04:51.392000 audit[2198]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.392000 audit[2198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff08c3ef0 a2=0 a3=1 items=0 ppid=2126 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.392000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:04:51.488000 audit[2199]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.488000 audit[2199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc0a7de60 a2=0 a3=1 items=0 ppid=2126 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.488000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:04:51.493000 audit[2201]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.493000 audit[2201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdaddbe60 a2=0 a3=1 items=0 ppid=2126 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.493000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 10:04:51.498000 audit[2204]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.498000 audit[2204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffffb936b50 a2=0 a3=1 items=0 ppid=2126 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.498000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 10:04:51.499000 audit[2205]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.499000 audit[2205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd5ffd2f0 a2=0 a3=1 items=0 ppid=2126 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.499000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:04:51.501000 audit[2207]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.501000 audit[2207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc5b00ee0 a2=0 a3=1 items=0 ppid=2126 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.501000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:04:51.502000 audit[2208]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.502000 audit[2208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2d07c20 a2=0 a3=1 items=0 ppid=2126 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.502000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:04:51.505000 audit[2210]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.505000 audit[2210]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff07b72c0 a2=0 a3=1 items=0 ppid=2126 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:04:51.509000 audit[2213]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.509000 audit[2213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe171eb70 a2=0 a3=1 items=0 ppid=2126 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.509000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 10:04:51.511000 audit[2214]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.511000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe121aef0 a2=0 a3=1 items=0 ppid=2126 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.511000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:04:51.513000 audit[2216]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.513000 audit[2216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe760ccf0 a2=0 a3=1 items=0 ppid=2126 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.513000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:04:51.514000 audit[2217]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.514000 audit[2217]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe639dbb0 a2=0 a3=1 items=0 ppid=2126 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.514000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:04:51.517000 audit[2219]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.517000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff0683ae0 a2=0 a3=1 items=0 ppid=2126 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.517000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:04:51.520000 audit[2222]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.520000 audit[2222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd9cce6d0 a2=0 a3=1 items=0 ppid=2126 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.520000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:04:51.524000 audit[2225]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.524000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc3b7ccd0 a2=0 a3=1 items=0 ppid=2126 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.524000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:04:51.525000 audit[2226]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.525000 audit[2226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdfed1e60 a2=0 a3=1 items=0 ppid=2126 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.525000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:04:51.528000 audit[2228]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.528000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffe5db9600 a2=0 a3=1 items=0 ppid=2126 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.528000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:04:51.532000 audit[2231]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.532000 audit[2231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffea3ea570 a2=0 a3=1 items=0 ppid=2126 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.532000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:04:51.534000 audit[2232]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.534000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc793f2c0 a2=0 a3=1 items=0 ppid=2126 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.534000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:04:51.537000 audit[2234]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:04:51.537000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=fffff179d6f0 a2=0 a3=1 items=0 ppid=2126 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:04:51.559000 audit[2240]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:04:51.559000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffd6973160 a2=0 a3=1 items=0 ppid=2126 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.559000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:04:51.572000 audit[2240]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:04:51.572000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffd6973160 a2=0 a3=1 items=0 ppid=2126 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.572000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:04:51.574000 audit[2245]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.574000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff7a52aa0 a2=0 a3=1 items=0 ppid=2126 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:04:51.576000 audit[2247]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.576000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe2b43f20 a2=0 a3=1 items=0 ppid=2126 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 10:04:51.581000 audit[2250]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.581000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffddcd2160 a2=0 a3=1 items=0 ppid=2126 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.581000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 10:04:51.583000 audit[2251]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.583000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc3ad4770 a2=0 a3=1 items=0 ppid=2126 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.583000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:04:51.585000 audit[2253]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.585000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff86fb380 a2=0 a3=1 items=0 ppid=2126 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.585000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:04:51.586000 audit[2254]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.586000 audit[2254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec08c5f0 a2=0 a3=1 items=0 ppid=2126 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.586000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:04:51.589000 audit[2256]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.589000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc87632b0 a2=0 a3=1 items=0 ppid=2126 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.589000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 10:04:51.593000 audit[2259]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.593000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffee364de0 a2=0 a3=1 items=0 ppid=2126 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.593000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:04:51.594000 audit[2260]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.594000 audit[2260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdcf44680 a2=0 a3=1 items=0 ppid=2126 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.594000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:04:51.596000 audit[2262]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.596000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdb98c9f0 a2=0 a3=1 items=0 ppid=2126 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.596000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:04:51.598000 audit[2263]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.598000 audit[2263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe8ec3a10 a2=0 a3=1 items=0 ppid=2126 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:04:51.600000 audit[2265]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.600000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdf34dd50 a2=0 a3=1 items=0 ppid=2126 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.600000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:04:51.603000 audit[2268]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.603000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe3d7b160 a2=0 a3=1 items=0 ppid=2126 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.603000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:04:51.607000 audit[2271]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.607000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc71f1770 a2=0 a3=1 items=0 ppid=2126 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.607000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 10:04:51.608000 audit[2272]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.608000 audit[2272]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe18169e0 a2=0 a3=1 items=0 ppid=2126 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.608000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:04:51.611000 audit[2274]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.611000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffcf421db0 a2=0 a3=1 items=0 ppid=2126 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.611000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:04:51.614000 audit[2277]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.614000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff5037b70 a2=0 a3=1 items=0 ppid=2126 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.614000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:04:51.615000 audit[2278]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.615000 audit[2278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc166cd90 a2=0 a3=1 items=0 ppid=2126 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.615000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:04:51.618000 audit[2280]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.618000 audit[2280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff901ebf0 a2=0 a3=1 items=0 ppid=2126 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.618000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:04:51.619000 audit[2281]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.619000 audit[2281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffceb19be0 a2=0 a3=1 items=0 ppid=2126 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.619000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:04:51.622000 audit[2283]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.622000 audit[2283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc0ea34d0 a2=0 a3=1 items=0 ppid=2126 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.622000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:04:51.625000 audit[2286]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:04:51.625000 audit[2286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffec49a7f0 a2=0 a3=1 items=0 ppid=2126 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.625000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:04:51.628000 audit[2288]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:04:51.628000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=fffff86c2650 a2=0 a3=1 items=0 ppid=2126 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.628000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:04:51.629000 audit[2288]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:04:51.629000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffff86c2650 a2=0 a3=1 items=0 ppid=2126 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:51.629000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:04:52.578788 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1807396000.mount: Deactivated successfully. May 15 10:04:53.042170 env[1216]: time="2025-05-15T10:04:53.042069097Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:53.047061 env[1216]: time="2025-05-15T10:04:53.047019625Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:53.048464 env[1216]: time="2025-05-15T10:04:53.048426101Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:53.049720 env[1216]: time="2025-05-15T10:04:53.049689285Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:53.050443 env[1216]: time="2025-05-15T10:04:53.050405024Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565\"" May 15 10:04:53.052968 env[1216]: time="2025-05-15T10:04:53.052807422Z" level=info msg="CreateContainer within sandbox \"43eb1db83d68e21a354ada768125320ba80196579c1c0d359a48c6179c67973c\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 15 10:04:53.071302 env[1216]: time="2025-05-15T10:04:53.071198537Z" level=info msg="CreateContainer within sandbox \"43eb1db83d68e21a354ada768125320ba80196579c1c0d359a48c6179c67973c\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"e1b5d84687372a6319f9b3acc546b0e8eec2cd6abbcf65bfc9e1b328f5fa9d1e\"" May 15 10:04:53.072085 env[1216]: time="2025-05-15T10:04:53.072053327Z" level=info msg="StartContainer for \"e1b5d84687372a6319f9b3acc546b0e8eec2cd6abbcf65bfc9e1b328f5fa9d1e\"" May 15 10:04:53.089458 systemd[1]: Started cri-containerd-e1b5d84687372a6319f9b3acc546b0e8eec2cd6abbcf65bfc9e1b328f5fa9d1e.scope. May 15 10:04:53.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit: BPF prog-id=111 op=LOAD May 15 10:04:53.110000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2101 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:53.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531623564383436383733373261363331396639623361636335343662 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2101 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:53.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531623564383436383733373261363331396639623361636335343662 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit: BPF prog-id=112 op=LOAD May 15 10:04:53.110000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2101 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:53.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531623564383436383733373261363331396639623361636335343662 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit: BPF prog-id=113 op=LOAD May 15 10:04:53.110000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2101 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:53.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531623564383436383733373261363331396639623361636335343662 May 15 10:04:53.110000 audit: BPF prog-id=113 op=UNLOAD May 15 10:04:53.110000 audit: BPF prog-id=112 op=UNLOAD May 15 10:04:53.110000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:53.110000 audit: BPF prog-id=114 op=LOAD May 15 10:04:53.110000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2101 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:53.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531623564383436383733373261363331396639623361636335343662 May 15 10:04:53.126231 env[1216]: time="2025-05-15T10:04:53.126181946Z" level=info msg="StartContainer for \"e1b5d84687372a6319f9b3acc546b0e8eec2cd6abbcf65bfc9e1b328f5fa9d1e\" returns successfully" May 15 10:04:53.338503 kubelet[1951]: I0515 10:04:53.338370 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-wl866" podStartSLOduration=3.338352542 podStartE2EDuration="3.338352542s" podCreationTimestamp="2025-05-15 10:04:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:04:51.337087299 +0000 UTC m=+7.124328419" watchObservedRunningTime="2025-05-15 10:04:53.338352542 +0000 UTC m=+9.125593702" May 15 10:04:53.338842 kubelet[1951]: I0515 10:04:53.338501 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6f6897fdc5-gmpws" podStartSLOduration=1.51235419 podStartE2EDuration="3.338488153s" podCreationTimestamp="2025-05-15 10:04:50 +0000 UTC" firstStartedPulling="2025-05-15 10:04:51.225191537 +0000 UTC m=+7.012432697" lastFinishedPulling="2025-05-15 10:04:53.0513255 +0000 UTC m=+8.838566660" observedRunningTime="2025-05-15 10:04:53.33845343 +0000 UTC m=+9.125694590" watchObservedRunningTime="2025-05-15 10:04:53.338488153 +0000 UTC m=+9.125729313" May 15 10:04:54.256959 kubelet[1951]: E0515 10:04:54.256906 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:54.331132 kubelet[1951]: E0515 10:04:54.331088 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:54.975400 update_engine[1209]: I0515 10:04:54.975353 1209 update_attempter.cc:509] Updating boot flags... May 15 10:04:56.902345 kernel: kauditd_printk_skb: 362 callbacks suppressed May 15 10:04:56.902498 kernel: audit: type=1325 audit(1747303496.897:907): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:04:56.902525 kernel: audit: type=1300 audit(1747303496.897:907): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd4f4cd20 a2=0 a3=1 items=0 ppid=2126 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:56.897000 audit[2343]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:04:56.897000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd4f4cd20 a2=0 a3=1 items=0 ppid=2126 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:56.897000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:04:56.904593 kernel: audit: type=1327 audit(1747303496.897:907): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:04:56.913568 kernel: audit: type=1325 audit(1747303496.908:908): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:04:56.913672 kernel: audit: type=1300 audit(1747303496.908:908): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd4f4cd20 a2=0 a3=1 items=0 ppid=2126 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:56.908000 audit[2343]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:04:56.908000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd4f4cd20 a2=0 a3=1 items=0 ppid=2126 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:56.908000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:04:56.915448 kernel: audit: type=1327 audit(1747303496.908:908): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:04:56.925000 audit[2345]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:04:56.925000 audit[2345]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe7cbd040 a2=0 a3=1 items=0 ppid=2126 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:56.930220 kernel: audit: type=1325 audit(1747303496.925:909): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:04:56.930341 kernel: audit: type=1300 audit(1747303496.925:909): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe7cbd040 a2=0 a3=1 items=0 ppid=2126 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:56.930364 kernel: audit: type=1327 audit(1747303496.925:909): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:04:56.925000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:04:56.937000 audit[2345]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:04:56.937000 audit[2345]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe7cbd040 a2=0 a3=1 items=0 ppid=2126 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:56.937000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:04:56.940276 kernel: audit: type=1325 audit(1747303496.937:910): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:04:57.540748 systemd[1]: Created slice kubepods-besteffort-pod22e34a38_1414_4c0c_a7f3_c7a2100b8943.slice. May 15 10:04:57.680913 kubelet[1951]: I0515 10:04:57.680583 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/22e34a38-1414-4c0c-a7f3-c7a2100b8943-tigera-ca-bundle\") pod \"calico-typha-5cb66886c-bck2m\" (UID: \"22e34a38-1414-4c0c-a7f3-c7a2100b8943\") " pod="calico-system/calico-typha-5cb66886c-bck2m" May 15 10:04:57.681322 kubelet[1951]: I0515 10:04:57.680921 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/22e34a38-1414-4c0c-a7f3-c7a2100b8943-typha-certs\") pod \"calico-typha-5cb66886c-bck2m\" (UID: \"22e34a38-1414-4c0c-a7f3-c7a2100b8943\") " pod="calico-system/calico-typha-5cb66886c-bck2m" May 15 10:04:57.681322 kubelet[1951]: I0515 10:04:57.680954 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5dtzk\" (UniqueName: \"kubernetes.io/projected/22e34a38-1414-4c0c-a7f3-c7a2100b8943-kube-api-access-5dtzk\") pod \"calico-typha-5cb66886c-bck2m\" (UID: \"22e34a38-1414-4c0c-a7f3-c7a2100b8943\") " pod="calico-system/calico-typha-5cb66886c-bck2m" May 15 10:04:57.742933 systemd[1]: Created slice kubepods-besteffort-podf7b4c9d8_8170_48c7_8403_e9637004d312.slice. May 15 10:04:57.781861 kubelet[1951]: I0515 10:04:57.781819 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/f7b4c9d8-8170-48c7-8403-e9637004d312-node-certs\") pod \"calico-node-pftvr\" (UID: \"f7b4c9d8-8170-48c7-8403-e9637004d312\") " pod="calico-system/calico-node-pftvr" May 15 10:04:57.781861 kubelet[1951]: I0515 10:04:57.781864 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/f7b4c9d8-8170-48c7-8403-e9637004d312-cni-bin-dir\") pod \"calico-node-pftvr\" (UID: \"f7b4c9d8-8170-48c7-8403-e9637004d312\") " pod="calico-system/calico-node-pftvr" May 15 10:04:57.782053 kubelet[1951]: I0515 10:04:57.781885 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f7b4c9d8-8170-48c7-8403-e9637004d312-tigera-ca-bundle\") pod \"calico-node-pftvr\" (UID: \"f7b4c9d8-8170-48c7-8403-e9637004d312\") " pod="calico-system/calico-node-pftvr" May 15 10:04:57.782053 kubelet[1951]: I0515 10:04:57.781923 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/f7b4c9d8-8170-48c7-8403-e9637004d312-var-run-calico\") pod \"calico-node-pftvr\" (UID: \"f7b4c9d8-8170-48c7-8403-e9637004d312\") " pod="calico-system/calico-node-pftvr" May 15 10:04:57.782053 kubelet[1951]: I0515 10:04:57.781950 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f7b4c9d8-8170-48c7-8403-e9637004d312-lib-modules\") pod \"calico-node-pftvr\" (UID: \"f7b4c9d8-8170-48c7-8403-e9637004d312\") " pod="calico-system/calico-node-pftvr" May 15 10:04:57.782053 kubelet[1951]: I0515 10:04:57.781965 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f7b4c9d8-8170-48c7-8403-e9637004d312-xtables-lock\") pod \"calico-node-pftvr\" (UID: \"f7b4c9d8-8170-48c7-8403-e9637004d312\") " pod="calico-system/calico-node-pftvr" May 15 10:04:57.782053 kubelet[1951]: I0515 10:04:57.781980 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/f7b4c9d8-8170-48c7-8403-e9637004d312-policysync\") pod \"calico-node-pftvr\" (UID: \"f7b4c9d8-8170-48c7-8403-e9637004d312\") " pod="calico-system/calico-node-pftvr" May 15 10:04:57.782189 kubelet[1951]: I0515 10:04:57.781995 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/f7b4c9d8-8170-48c7-8403-e9637004d312-flexvol-driver-host\") pod \"calico-node-pftvr\" (UID: \"f7b4c9d8-8170-48c7-8403-e9637004d312\") " pod="calico-system/calico-node-pftvr" May 15 10:04:57.782189 kubelet[1951]: I0515 10:04:57.782013 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f7b4c9d8-8170-48c7-8403-e9637004d312-var-lib-calico\") pod \"calico-node-pftvr\" (UID: \"f7b4c9d8-8170-48c7-8403-e9637004d312\") " pod="calico-system/calico-node-pftvr" May 15 10:04:57.782189 kubelet[1951]: I0515 10:04:57.782027 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/f7b4c9d8-8170-48c7-8403-e9637004d312-cni-log-dir\") pod \"calico-node-pftvr\" (UID: \"f7b4c9d8-8170-48c7-8403-e9637004d312\") " pod="calico-system/calico-node-pftvr" May 15 10:04:57.782189 kubelet[1951]: I0515 10:04:57.782044 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/f7b4c9d8-8170-48c7-8403-e9637004d312-cni-net-dir\") pod \"calico-node-pftvr\" (UID: \"f7b4c9d8-8170-48c7-8403-e9637004d312\") " pod="calico-system/calico-node-pftvr" May 15 10:04:57.782189 kubelet[1951]: I0515 10:04:57.782058 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8z6pd\" (UniqueName: \"kubernetes.io/projected/f7b4c9d8-8170-48c7-8403-e9637004d312-kube-api-access-8z6pd\") pod \"calico-node-pftvr\" (UID: \"f7b4c9d8-8170-48c7-8403-e9637004d312\") " pod="calico-system/calico-node-pftvr" May 15 10:04:57.846085 kubelet[1951]: E0515 10:04:57.845975 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:57.847029 env[1216]: time="2025-05-15T10:04:57.846888592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5cb66886c-bck2m,Uid:22e34a38-1414-4c0c-a7f3-c7a2100b8943,Namespace:calico-system,Attempt:0,}" May 15 10:04:57.870877 env[1216]: time="2025-05-15T10:04:57.870817561Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:04:57.870877 env[1216]: time="2025-05-15T10:04:57.870854204Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:04:57.870877 env[1216]: time="2025-05-15T10:04:57.870864324Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:04:57.871089 env[1216]: time="2025-05-15T10:04:57.871046057Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/71cf1f050543dd7bc8a4cbfec67cc01fc8f828055ef5650a1814309a87123549 pid=2355 runtime=io.containerd.runc.v2 May 15 10:04:57.885012 systemd[1]: Started cri-containerd-71cf1f050543dd7bc8a4cbfec67cc01fc8f828055ef5650a1814309a87123549.scope. May 15 10:04:57.885905 kubelet[1951]: E0515 10:04:57.885740 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.885905 kubelet[1951]: W0515 10:04:57.885762 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.885905 kubelet[1951]: E0515 10:04:57.885784 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.886241 kubelet[1951]: E0515 10:04:57.886125 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.886241 kubelet[1951]: W0515 10:04:57.886140 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.886241 kubelet[1951]: E0515 10:04:57.886224 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.887410 kubelet[1951]: E0515 10:04:57.886839 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.887410 kubelet[1951]: W0515 10:04:57.886853 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.887410 kubelet[1951]: E0515 10:04:57.887152 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.887410 kubelet[1951]: E0515 10:04:57.887214 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.887410 kubelet[1951]: W0515 10:04:57.887247 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.887410 kubelet[1951]: E0515 10:04:57.887385 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.887809 kubelet[1951]: E0515 10:04:57.887693 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.887809 kubelet[1951]: W0515 10:04:57.887706 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.888066 kubelet[1951]: E0515 10:04:57.887954 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.888066 kubelet[1951]: W0515 10:04:57.887964 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.888066 kubelet[1951]: E0515 10:04:57.887990 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.888478 kubelet[1951]: E0515 10:04:57.888359 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.888478 kubelet[1951]: E0515 10:04:57.888393 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.888478 kubelet[1951]: W0515 10:04:57.888406 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.888478 kubelet[1951]: E0515 10:04:57.888421 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.891572 kubelet[1951]: E0515 10:04:57.889537 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.891572 kubelet[1951]: W0515 10:04:57.889563 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.891572 kubelet[1951]: E0515 10:04:57.889583 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.891572 kubelet[1951]: E0515 10:04:57.889790 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.891572 kubelet[1951]: W0515 10:04:57.889800 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.891572 kubelet[1951]: E0515 10:04:57.889810 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.892489 kubelet[1951]: E0515 10:04:57.892469 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.892574 kubelet[1951]: W0515 10:04:57.892486 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.892700 kubelet[1951]: E0515 10:04:57.892625 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.892764 kubelet[1951]: E0515 10:04:57.892743 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.892764 kubelet[1951]: W0515 10:04:57.892755 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.892824 kubelet[1951]: E0515 10:04:57.892772 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.894455 kubelet[1951]: E0515 10:04:57.894436 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.894562 kubelet[1951]: W0515 10:04:57.894548 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.894646 kubelet[1951]: E0515 10:04:57.894633 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.895000 kubelet[1951]: E0515 10:04:57.894973 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.895000 kubelet[1951]: W0515 10:04:57.894991 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.895095 kubelet[1951]: E0515 10:04:57.895004 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.895690 kubelet[1951]: E0515 10:04:57.895674 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.895797 kubelet[1951]: W0515 10:04:57.895784 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.895869 kubelet[1951]: E0515 10:04:57.895855 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.897740 kubelet[1951]: E0515 10:04:57.897724 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.897845 kubelet[1951]: W0515 10:04:57.897831 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.897924 kubelet[1951]: E0515 10:04:57.897912 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit: BPF prog-id=115 op=LOAD May 15 10:04:57.914000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[2364]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2355 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:57.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731636631663035303534336464376263386134636266656336376363 May 15 10:04:57.914000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[2364]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2355 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:57.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731636631663035303534336464376263386134636266656336376363 May 15 10:04:57.914000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.914000 audit: BPF prog-id=116 op=LOAD May 15 10:04:57.914000 audit[2364]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2355 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:57.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731636631663035303534336464376263386134636266656336376363 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit: BPF prog-id=117 op=LOAD May 15 10:04:57.915000 audit[2364]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2355 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:57.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731636631663035303534336464376263386134636266656336376363 May 15 10:04:57.915000 audit: BPF prog-id=117 op=UNLOAD May 15 10:04:57.915000 audit: BPF prog-id=116 op=UNLOAD May 15 10:04:57.915000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:57.915000 audit: BPF prog-id=118 op=LOAD May 15 10:04:57.915000 audit[2364]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2355 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:57.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731636631663035303534336464376263386134636266656336376363 May 15 10:04:57.943626 kubelet[1951]: E0515 10:04:57.943581 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8v6wf" podUID="b24f406a-f736-4264-9766-c83335e6676c" May 15 10:04:57.952000 audit[2405]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:04:57.952000 audit[2405]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffc31b7ad0 a2=0 a3=1 items=0 ppid=2126 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:57.952000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:04:57.969731 env[1216]: time="2025-05-15T10:04:57.969675648Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5cb66886c-bck2m,Uid:22e34a38-1414-4c0c-a7f3-c7a2100b8943,Namespace:calico-system,Attempt:0,} returns sandbox id \"71cf1f050543dd7bc8a4cbfec67cc01fc8f828055ef5650a1814309a87123549\"" May 15 10:04:57.970425 kubelet[1951]: E0515 10:04:57.970398 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:57.969000 audit[2405]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:04:57.971434 env[1216]: time="2025-05-15T10:04:57.971400444Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 15 10:04:57.969000 audit[2405]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc31b7ad0 a2=0 a3=1 items=0 ppid=2126 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:57.969000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:04:57.983361 kubelet[1951]: E0515 10:04:57.983308 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.983361 kubelet[1951]: W0515 10:04:57.983340 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.983521 kubelet[1951]: E0515 10:04:57.983374 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.983581 kubelet[1951]: E0515 10:04:57.983561 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.983581 kubelet[1951]: W0515 10:04:57.983575 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.983643 kubelet[1951]: E0515 10:04:57.983585 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.986390 kubelet[1951]: E0515 10:04:57.986359 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.986390 kubelet[1951]: W0515 10:04:57.986381 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.986390 kubelet[1951]: E0515 10:04:57.986398 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.986637 kubelet[1951]: E0515 10:04:57.986622 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.986637 kubelet[1951]: W0515 10:04:57.986635 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.986702 kubelet[1951]: E0515 10:04:57.986646 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.989129 kubelet[1951]: E0515 10:04:57.989093 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.989129 kubelet[1951]: W0515 10:04:57.989124 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.989252 kubelet[1951]: E0515 10:04:57.989140 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.989395 kubelet[1951]: E0515 10:04:57.989379 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.989429 kubelet[1951]: W0515 10:04:57.989398 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.989429 kubelet[1951]: E0515 10:04:57.989409 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.990354 kubelet[1951]: E0515 10:04:57.990331 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.990401 kubelet[1951]: W0515 10:04:57.990356 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.990401 kubelet[1951]: E0515 10:04:57.990372 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.990566 kubelet[1951]: E0515 10:04:57.990551 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.990566 kubelet[1951]: W0515 10:04:57.990564 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.990635 kubelet[1951]: E0515 10:04:57.990573 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.990737 kubelet[1951]: E0515 10:04:57.990726 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.990737 kubelet[1951]: W0515 10:04:57.990737 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.990798 kubelet[1951]: E0515 10:04:57.990745 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.990895 kubelet[1951]: E0515 10:04:57.990884 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.990930 kubelet[1951]: W0515 10:04:57.990895 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.990930 kubelet[1951]: E0515 10:04:57.990904 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.991042 kubelet[1951]: E0515 10:04:57.991029 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.991072 kubelet[1951]: W0515 10:04:57.991043 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.991072 kubelet[1951]: E0515 10:04:57.991050 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.991189 kubelet[1951]: E0515 10:04:57.991179 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.991224 kubelet[1951]: W0515 10:04:57.991191 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.991224 kubelet[1951]: E0515 10:04:57.991198 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.991335 kubelet[1951]: E0515 10:04:57.991325 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.991365 kubelet[1951]: W0515 10:04:57.991334 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.991365 kubelet[1951]: E0515 10:04:57.991349 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.991472 kubelet[1951]: E0515 10:04:57.991464 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.991472 kubelet[1951]: W0515 10:04:57.991472 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.991530 kubelet[1951]: E0515 10:04:57.991480 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.991607 kubelet[1951]: E0515 10:04:57.991598 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.991607 kubelet[1951]: W0515 10:04:57.991608 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.991674 kubelet[1951]: E0515 10:04:57.991617 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.991757 kubelet[1951]: E0515 10:04:57.991742 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.991757 kubelet[1951]: W0515 10:04:57.991751 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.991825 kubelet[1951]: E0515 10:04:57.991759 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.991945 kubelet[1951]: E0515 10:04:57.991934 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.991945 kubelet[1951]: W0515 10:04:57.991945 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.992004 kubelet[1951]: E0515 10:04:57.991953 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.992093 kubelet[1951]: E0515 10:04:57.992084 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.992093 kubelet[1951]: W0515 10:04:57.992093 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.992162 kubelet[1951]: E0515 10:04:57.992101 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.992250 kubelet[1951]: E0515 10:04:57.992241 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.992304 kubelet[1951]: W0515 10:04:57.992252 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.992304 kubelet[1951]: E0515 10:04:57.992270 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:57.992397 kubelet[1951]: E0515 10:04:57.992389 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:57.992397 kubelet[1951]: W0515 10:04:57.992397 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:57.992457 kubelet[1951]: E0515 10:04:57.992405 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.045937 kubelet[1951]: E0515 10:04:58.045668 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:58.046186 env[1216]: time="2025-05-15T10:04:58.046137525Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pftvr,Uid:f7b4c9d8-8170-48c7-8403-e9637004d312,Namespace:calico-system,Attempt:0,}" May 15 10:04:58.060389 env[1216]: time="2025-05-15T10:04:58.060312913Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:04:58.060389 env[1216]: time="2025-05-15T10:04:58.060357196Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:04:58.060389 env[1216]: time="2025-05-15T10:04:58.060367316Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:04:58.060762 env[1216]: time="2025-05-15T10:04:58.060727019Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/46d3a7e71d015775c6135b8be882b2993e5cf42dd85c9ed4ac2ce91b90de00ae pid=2434 runtime=io.containerd.runc.v2 May 15 10:04:58.075604 systemd[1]: Started cri-containerd-46d3a7e71d015775c6135b8be882b2993e5cf42dd85c9ed4ac2ce91b90de00ae.scope. May 15 10:04:58.083416 kubelet[1951]: E0515 10:04:58.083393 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.083416 kubelet[1951]: W0515 10:04:58.083414 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.083568 kubelet[1951]: E0515 10:04:58.083436 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.083568 kubelet[1951]: I0515 10:04:58.083468 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b24f406a-f736-4264-9766-c83335e6676c-varrun\") pod \"csi-node-driver-8v6wf\" (UID: \"b24f406a-f736-4264-9766-c83335e6676c\") " pod="calico-system/csi-node-driver-8v6wf" May 15 10:04:58.083661 kubelet[1951]: E0515 10:04:58.083645 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.083661 kubelet[1951]: W0515 10:04:58.083659 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.083736 kubelet[1951]: E0515 10:04:58.083670 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.083736 kubelet[1951]: I0515 10:04:58.083684 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b24f406a-f736-4264-9766-c83335e6676c-kubelet-dir\") pod \"csi-node-driver-8v6wf\" (UID: \"b24f406a-f736-4264-9766-c83335e6676c\") " pod="calico-system/csi-node-driver-8v6wf" May 15 10:04:58.083844 kubelet[1951]: E0515 10:04:58.083831 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.083844 kubelet[1951]: W0515 10:04:58.083845 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.083923 kubelet[1951]: E0515 10:04:58.083854 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.083923 kubelet[1951]: I0515 10:04:58.083867 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b24f406a-f736-4264-9766-c83335e6676c-registration-dir\") pod \"csi-node-driver-8v6wf\" (UID: \"b24f406a-f736-4264-9766-c83335e6676c\") " pod="calico-system/csi-node-driver-8v6wf" May 15 10:04:58.084024 kubelet[1951]: E0515 10:04:58.084007 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.084024 kubelet[1951]: W0515 10:04:58.084023 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.084093 kubelet[1951]: E0515 10:04:58.084033 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.084093 kubelet[1951]: I0515 10:04:58.084047 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pqjhd\" (UniqueName: \"kubernetes.io/projected/b24f406a-f736-4264-9766-c83335e6676c-kube-api-access-pqjhd\") pod \"csi-node-driver-8v6wf\" (UID: \"b24f406a-f736-4264-9766-c83335e6676c\") " pod="calico-system/csi-node-driver-8v6wf" May 15 10:04:58.084204 kubelet[1951]: E0515 10:04:58.084193 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.084204 kubelet[1951]: W0515 10:04:58.084204 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.084278 kubelet[1951]: E0515 10:04:58.084213 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.084278 kubelet[1951]: I0515 10:04:58.084225 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b24f406a-f736-4264-9766-c83335e6676c-socket-dir\") pod \"csi-node-driver-8v6wf\" (UID: \"b24f406a-f736-4264-9766-c83335e6676c\") " pod="calico-system/csi-node-driver-8v6wf" May 15 10:04:58.084452 kubelet[1951]: E0515 10:04:58.084433 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.084452 kubelet[1951]: W0515 10:04:58.084452 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.084518 kubelet[1951]: E0515 10:04:58.084462 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.084600 kubelet[1951]: E0515 10:04:58.084588 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.084641 kubelet[1951]: W0515 10:04:58.084604 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.084641 kubelet[1951]: E0515 10:04:58.084612 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.084798 kubelet[1951]: E0515 10:04:58.084780 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.084798 kubelet[1951]: W0515 10:04:58.084792 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.084860 kubelet[1951]: E0515 10:04:58.084805 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.084964 kubelet[1951]: E0515 10:04:58.084952 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.084964 kubelet[1951]: W0515 10:04:58.084961 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.085020 kubelet[1951]: E0515 10:04:58.084974 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.085146 kubelet[1951]: E0515 10:04:58.085132 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.085146 kubelet[1951]: W0515 10:04:58.085142 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.085227 kubelet[1951]: E0515 10:04:58.085156 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.085353 kubelet[1951]: E0515 10:04:58.085341 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.085353 kubelet[1951]: W0515 10:04:58.085349 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.085480 kubelet[1951]: E0515 10:04:58.085447 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.085527 kubelet[1951]: E0515 10:04:58.085502 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.085527 kubelet[1951]: W0515 10:04:58.085509 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.085609 kubelet[1951]: E0515 10:04:58.085589 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.085675 kubelet[1951]: E0515 10:04:58.085662 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.085675 kubelet[1951]: W0515 10:04:58.085670 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.085746 kubelet[1951]: E0515 10:04:58.085683 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.085840 kubelet[1951]: E0515 10:04:58.085827 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.085840 kubelet[1951]: W0515 10:04:58.085837 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.085902 kubelet[1951]: E0515 10:04:58.085845 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.086003 kubelet[1951]: E0515 10:04:58.085990 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.086003 kubelet[1951]: W0515 10:04:58.086000 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.086060 kubelet[1951]: E0515 10:04:58.086008 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.097000 audit: BPF prog-id=119 op=LOAD May 15 10:04:58.097000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.097000 audit[2443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2434 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:58.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436643361376537316430313537373563363133356238626538383262 May 15 10:04:58.097000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.097000 audit[2443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2434 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:58.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436643361376537316430313537373563363133356238626538383262 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit: BPF prog-id=120 op=LOAD May 15 10:04:58.098000 audit[2443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2434 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:58.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436643361376537316430313537373563363133356238626538383262 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.098000 audit: BPF prog-id=121 op=LOAD May 15 10:04:58.098000 audit[2443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2434 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:58.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436643361376537316430313537373563363133356238626538383262 May 15 10:04:58.099000 audit: BPF prog-id=121 op=UNLOAD May 15 10:04:58.099000 audit: BPF prog-id=120 op=UNLOAD May 15 10:04:58.099000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.099000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.099000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.099000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.099000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.099000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.099000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.099000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.099000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.099000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:04:58.099000 audit: BPF prog-id=122 op=LOAD May 15 10:04:58.099000 audit[2443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2434 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:04:58.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436643361376537316430313537373563363133356238626538383262 May 15 10:04:58.115578 env[1216]: time="2025-05-15T10:04:58.115531888Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pftvr,Uid:f7b4c9d8-8170-48c7-8403-e9637004d312,Namespace:calico-system,Attempt:0,} returns sandbox id \"46d3a7e71d015775c6135b8be882b2993e5cf42dd85c9ed4ac2ce91b90de00ae\"" May 15 10:04:58.117930 kubelet[1951]: E0515 10:04:58.117907 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:58.185008 kubelet[1951]: E0515 10:04:58.184972 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.185008 kubelet[1951]: W0515 10:04:58.184995 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.185008 kubelet[1951]: E0515 10:04:58.185014 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.185277 kubelet[1951]: E0515 10:04:58.185243 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.185277 kubelet[1951]: W0515 10:04:58.185274 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.185351 kubelet[1951]: E0515 10:04:58.185294 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.185545 kubelet[1951]: E0515 10:04:58.185521 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.185545 kubelet[1951]: W0515 10:04:58.185534 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.185611 kubelet[1951]: E0515 10:04:58.185553 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.185754 kubelet[1951]: E0515 10:04:58.185742 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.185754 kubelet[1951]: W0515 10:04:58.185752 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.185816 kubelet[1951]: E0515 10:04:58.185770 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.185959 kubelet[1951]: E0515 10:04:58.185936 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.185959 kubelet[1951]: W0515 10:04:58.185948 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.186015 kubelet[1951]: E0515 10:04:58.185964 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.186155 kubelet[1951]: E0515 10:04:58.186142 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.186155 kubelet[1951]: W0515 10:04:58.186152 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.186219 kubelet[1951]: E0515 10:04:58.186165 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.186325 kubelet[1951]: E0515 10:04:58.186314 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.186325 kubelet[1951]: W0515 10:04:58.186324 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.186385 kubelet[1951]: E0515 10:04:58.186353 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.186478 kubelet[1951]: E0515 10:04:58.186468 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.186478 kubelet[1951]: W0515 10:04:58.186477 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.186526 kubelet[1951]: E0515 10:04:58.186498 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.186627 kubelet[1951]: E0515 10:04:58.186617 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.186627 kubelet[1951]: W0515 10:04:58.186626 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.186673 kubelet[1951]: E0515 10:04:58.186646 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.186770 kubelet[1951]: E0515 10:04:58.186760 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.186796 kubelet[1951]: W0515 10:04:58.186769 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.186796 kubelet[1951]: E0515 10:04:58.186790 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.186903 kubelet[1951]: E0515 10:04:58.186894 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.186929 kubelet[1951]: W0515 10:04:58.186903 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.186929 kubelet[1951]: E0515 10:04:58.186916 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.187041 kubelet[1951]: E0515 10:04:58.187032 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.187069 kubelet[1951]: W0515 10:04:58.187041 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.187069 kubelet[1951]: E0515 10:04:58.187053 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.187223 kubelet[1951]: E0515 10:04:58.187212 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.187223 kubelet[1951]: W0515 10:04:58.187221 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.187289 kubelet[1951]: E0515 10:04:58.187233 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.187425 kubelet[1951]: E0515 10:04:58.187403 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.187425 kubelet[1951]: W0515 10:04:58.187413 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.187484 kubelet[1951]: E0515 10:04:58.187430 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.187587 kubelet[1951]: E0515 10:04:58.187577 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.187612 kubelet[1951]: W0515 10:04:58.187586 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.187612 kubelet[1951]: E0515 10:04:58.187601 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.187774 kubelet[1951]: E0515 10:04:58.187764 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.187801 kubelet[1951]: W0515 10:04:58.187774 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.187801 kubelet[1951]: E0515 10:04:58.187793 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.187922 kubelet[1951]: E0515 10:04:58.187912 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.187945 kubelet[1951]: W0515 10:04:58.187921 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.187945 kubelet[1951]: E0515 10:04:58.187938 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.188054 kubelet[1951]: E0515 10:04:58.188045 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.188080 kubelet[1951]: W0515 10:04:58.188054 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.188080 kubelet[1951]: E0515 10:04:58.188071 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.188194 kubelet[1951]: E0515 10:04:58.188184 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.188194 kubelet[1951]: W0515 10:04:58.188193 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.188238 kubelet[1951]: E0515 10:04:58.188210 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.188340 kubelet[1951]: E0515 10:04:58.188331 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.188373 kubelet[1951]: W0515 10:04:58.188340 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.188373 kubelet[1951]: E0515 10:04:58.188353 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.188521 kubelet[1951]: E0515 10:04:58.188511 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.188544 kubelet[1951]: W0515 10:04:58.188521 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.188544 kubelet[1951]: E0515 10:04:58.188536 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.188680 kubelet[1951]: E0515 10:04:58.188670 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.188708 kubelet[1951]: W0515 10:04:58.188680 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.188708 kubelet[1951]: E0515 10:04:58.188693 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.188843 kubelet[1951]: E0515 10:04:58.188834 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.188872 kubelet[1951]: W0515 10:04:58.188844 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.188872 kubelet[1951]: E0515 10:04:58.188856 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.189099 kubelet[1951]: E0515 10:04:58.189083 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.189142 kubelet[1951]: W0515 10:04:58.189099 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.189142 kubelet[1951]: E0515 10:04:58.189123 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.189454 kubelet[1951]: E0515 10:04:58.189427 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.189454 kubelet[1951]: W0515 10:04:58.189445 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.189515 kubelet[1951]: E0515 10:04:58.189457 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.198884 kubelet[1951]: E0515 10:04:58.198818 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.198884 kubelet[1951]: W0515 10:04:58.198835 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.198884 kubelet[1951]: E0515 10:04:58.198849 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.697421 kubelet[1951]: E0515 10:04:58.697393 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:04:58.796794 kubelet[1951]: E0515 10:04:58.796760 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.796794 kubelet[1951]: W0515 10:04:58.796781 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.796794 kubelet[1951]: E0515 10:04:58.796801 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.797041 kubelet[1951]: E0515 10:04:58.797013 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.797041 kubelet[1951]: W0515 10:04:58.797028 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.797041 kubelet[1951]: E0515 10:04:58.797039 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.797235 kubelet[1951]: E0515 10:04:58.797205 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.797235 kubelet[1951]: W0515 10:04:58.797225 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.797235 kubelet[1951]: E0515 10:04:58.797235 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.797413 kubelet[1951]: E0515 10:04:58.797394 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.797413 kubelet[1951]: W0515 10:04:58.797406 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.797463 kubelet[1951]: E0515 10:04:58.797420 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:58.797576 kubelet[1951]: E0515 10:04:58.797556 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:04:58.797604 kubelet[1951]: W0515 10:04:58.797577 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:04:58.797604 kubelet[1951]: E0515 10:04:58.797585 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:04:59.304492 kubelet[1951]: E0515 10:04:59.304404 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8v6wf" podUID="b24f406a-f736-4264-9766-c83335e6676c" May 15 10:04:59.913721 env[1216]: time="2025-05-15T10:04:59.913669506Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:59.915340 env[1216]: time="2025-05-15T10:04:59.915302126Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:59.917507 env[1216]: time="2025-05-15T10:04:59.917476338Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:59.918840 env[1216]: time="2025-05-15T10:04:59.918812780Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:04:59.919314 env[1216]: time="2025-05-15T10:04:59.919281568Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54\"" May 15 10:04:59.921113 env[1216]: time="2025-05-15T10:04:59.921078918Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 10:04:59.934130 env[1216]: time="2025-05-15T10:04:59.934087232Z" level=info msg="CreateContainer within sandbox \"71cf1f050543dd7bc8a4cbfec67cc01fc8f828055ef5650a1814309a87123549\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 15 10:04:59.947595 env[1216]: time="2025-05-15T10:04:59.947544173Z" level=info msg="CreateContainer within sandbox \"71cf1f050543dd7bc8a4cbfec67cc01fc8f828055ef5650a1814309a87123549\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"78e7c50c0582d0cbd7c92b3af535aba0863ab8661d4ba776703b3efd8c9c8d5e\"" May 15 10:04:59.948481 env[1216]: time="2025-05-15T10:04:59.948373263Z" level=info msg="StartContainer for \"78e7c50c0582d0cbd7c92b3af535aba0863ab8661d4ba776703b3efd8c9c8d5e\"" May 15 10:04:59.969106 systemd[1]: Started cri-containerd-78e7c50c0582d0cbd7c92b3af535aba0863ab8661d4ba776703b3efd8c9c8d5e.scope. May 15 10:05:00.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.023000 audit: BPF prog-id=123 op=LOAD May 15 10:05:00.024000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2355 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:00.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738653763353063303538326430636264376339326233616635333561 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2355 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:00.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738653763353063303538326430636264376339326233616635333561 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit: BPF prog-id=124 op=LOAD May 15 10:05:00.024000 audit[2524]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2355 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:00.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738653763353063303538326430636264376339326233616635333561 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit: BPF prog-id=125 op=LOAD May 15 10:05:00.024000 audit[2524]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2355 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:00.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738653763353063303538326430636264376339326233616635333561 May 15 10:05:00.024000 audit: BPF prog-id=125 op=UNLOAD May 15 10:05:00.024000 audit: BPF prog-id=124 op=UNLOAD May 15 10:05:00.024000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:00.024000 audit: BPF prog-id=126 op=LOAD May 15 10:05:00.024000 audit[2524]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2355 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:00.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738653763353063303538326430636264376339326233616635333561 May 15 10:05:00.087156 env[1216]: time="2025-05-15T10:05:00.085939576Z" level=info msg="StartContainer for \"78e7c50c0582d0cbd7c92b3af535aba0863ab8661d4ba776703b3efd8c9c8d5e\" returns successfully" May 15 10:05:00.344427 kubelet[1951]: E0515 10:05:00.343569 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:00.368301 kubelet[1951]: I0515 10:05:00.368215 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5cb66886c-bck2m" podStartSLOduration=1.418529686 podStartE2EDuration="3.368196841s" podCreationTimestamp="2025-05-15 10:04:57 +0000 UTC" firstStartedPulling="2025-05-15 10:04:57.971126746 +0000 UTC m=+13.758367906" lastFinishedPulling="2025-05-15 10:04:59.920793901 +0000 UTC m=+15.708035061" observedRunningTime="2025-05-15 10:05:00.355368055 +0000 UTC m=+16.142609255" watchObservedRunningTime="2025-05-15 10:05:00.368196841 +0000 UTC m=+16.155438001" May 15 10:05:00.374000 audit[2558]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2558 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:00.374000 audit[2558]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd6fd1900 a2=0 a3=1 items=0 ppid=2126 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:00.374000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:00.381000 audit[2558]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2558 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:00.381000 audit[2558]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffd6fd1900 a2=0 a3=1 items=0 ppid=2126 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:00.381000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:00.409174 kubelet[1951]: E0515 10:05:00.409058 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.409174 kubelet[1951]: W0515 10:05:00.409081 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.409174 kubelet[1951]: E0515 10:05:00.409099 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.409531 kubelet[1951]: E0515 10:05:00.409435 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.409531 kubelet[1951]: W0515 10:05:00.409447 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.409531 kubelet[1951]: E0515 10:05:00.409458 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.409780 kubelet[1951]: E0515 10:05:00.409676 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.409780 kubelet[1951]: W0515 10:05:00.409688 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.409780 kubelet[1951]: E0515 10:05:00.409697 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.410028 kubelet[1951]: E0515 10:05:00.409926 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.410028 kubelet[1951]: W0515 10:05:00.409937 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.410028 kubelet[1951]: E0515 10:05:00.409946 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.410294 kubelet[1951]: E0515 10:05:00.410171 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.410294 kubelet[1951]: W0515 10:05:00.410183 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.410294 kubelet[1951]: E0515 10:05:00.410192 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.410475 kubelet[1951]: E0515 10:05:00.410461 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.410539 kubelet[1951]: W0515 10:05:00.410527 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.410599 kubelet[1951]: E0515 10:05:00.410588 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.410828 kubelet[1951]: E0515 10:05:00.410813 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.410909 kubelet[1951]: W0515 10:05:00.410897 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.410978 kubelet[1951]: E0515 10:05:00.410968 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.411192 kubelet[1951]: E0515 10:05:00.411178 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.411307 kubelet[1951]: W0515 10:05:00.411292 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.411371 kubelet[1951]: E0515 10:05:00.411357 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.411618 kubelet[1951]: E0515 10:05:00.411603 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.411708 kubelet[1951]: W0515 10:05:00.411694 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.411773 kubelet[1951]: E0515 10:05:00.411762 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.411981 kubelet[1951]: E0515 10:05:00.411969 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.412059 kubelet[1951]: W0515 10:05:00.412047 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.412135 kubelet[1951]: E0515 10:05:00.412122 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.412365 kubelet[1951]: E0515 10:05:00.412350 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.412438 kubelet[1951]: W0515 10:05:00.412426 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.412507 kubelet[1951]: E0515 10:05:00.412495 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.412715 kubelet[1951]: E0515 10:05:00.412702 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.412797 kubelet[1951]: W0515 10:05:00.412783 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.412853 kubelet[1951]: E0515 10:05:00.412842 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.413126 kubelet[1951]: E0515 10:05:00.413112 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.413217 kubelet[1951]: W0515 10:05:00.413204 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.413317 kubelet[1951]: E0515 10:05:00.413302 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.413550 kubelet[1951]: E0515 10:05:00.413538 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.413624 kubelet[1951]: W0515 10:05:00.413611 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.413680 kubelet[1951]: E0515 10:05:00.413669 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.413936 kubelet[1951]: E0515 10:05:00.413923 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.414009 kubelet[1951]: W0515 10:05:00.413997 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.414077 kubelet[1951]: E0515 10:05:00.414066 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.501439 kubelet[1951]: E0515 10:05:00.501398 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.501439 kubelet[1951]: W0515 10:05:00.501432 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.501652 kubelet[1951]: E0515 10:05:00.501454 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.501735 kubelet[1951]: E0515 10:05:00.501721 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.501774 kubelet[1951]: W0515 10:05:00.501735 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.501774 kubelet[1951]: E0515 10:05:00.501752 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.501985 kubelet[1951]: E0515 10:05:00.501966 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.502024 kubelet[1951]: W0515 10:05:00.501985 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.502024 kubelet[1951]: E0515 10:05:00.502003 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.502174 kubelet[1951]: E0515 10:05:00.502162 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.502216 kubelet[1951]: W0515 10:05:00.502174 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.502216 kubelet[1951]: E0515 10:05:00.502188 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.502392 kubelet[1951]: E0515 10:05:00.502380 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.502430 kubelet[1951]: W0515 10:05:00.502392 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.502430 kubelet[1951]: E0515 10:05:00.502408 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.502582 kubelet[1951]: E0515 10:05:00.502572 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.502613 kubelet[1951]: W0515 10:05:00.502582 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.502613 kubelet[1951]: E0515 10:05:00.502592 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.503049 kubelet[1951]: E0515 10:05:00.503034 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.503049 kubelet[1951]: W0515 10:05:00.503047 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.503132 kubelet[1951]: E0515 10:05:00.503115 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.503293 kubelet[1951]: E0515 10:05:00.503282 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.503293 kubelet[1951]: W0515 10:05:00.503292 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.503375 kubelet[1951]: E0515 10:05:00.503360 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.503474 kubelet[1951]: E0515 10:05:00.503464 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.503474 kubelet[1951]: W0515 10:05:00.503474 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.503533 kubelet[1951]: E0515 10:05:00.503485 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.503649 kubelet[1951]: E0515 10:05:00.503634 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.503649 kubelet[1951]: W0515 10:05:00.503645 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.503712 kubelet[1951]: E0515 10:05:00.503653 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.503816 kubelet[1951]: E0515 10:05:00.503794 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.503816 kubelet[1951]: W0515 10:05:00.503810 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.503885 kubelet[1951]: E0515 10:05:00.503824 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.504024 kubelet[1951]: E0515 10:05:00.504004 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.504024 kubelet[1951]: W0515 10:05:00.504017 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.504100 kubelet[1951]: E0515 10:05:00.504029 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.504363 kubelet[1951]: E0515 10:05:00.504346 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.504443 kubelet[1951]: W0515 10:05:00.504429 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.504527 kubelet[1951]: E0515 10:05:00.504513 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.504696 kubelet[1951]: E0515 10:05:00.504668 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.504696 kubelet[1951]: W0515 10:05:00.504687 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.504696 kubelet[1951]: E0515 10:05:00.504702 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.504910 kubelet[1951]: E0515 10:05:00.504865 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.504910 kubelet[1951]: W0515 10:05:00.504877 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.504910 kubelet[1951]: E0515 10:05:00.504887 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.505044 kubelet[1951]: E0515 10:05:00.505029 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.505044 kubelet[1951]: W0515 10:05:00.505041 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.505098 kubelet[1951]: E0515 10:05:00.505049 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.505211 kubelet[1951]: E0515 10:05:00.505201 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.505236 kubelet[1951]: W0515 10:05:00.505212 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.505236 kubelet[1951]: E0515 10:05:00.505221 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:00.505565 kubelet[1951]: E0515 10:05:00.505551 1951 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:05:00.505565 kubelet[1951]: W0515 10:05:00.505563 1951 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:05:00.505632 kubelet[1951]: E0515 10:05:00.505572 1951 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:05:01.079102 env[1216]: time="2025-05-15T10:05:01.079036081Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:01.080851 env[1216]: time="2025-05-15T10:05:01.080804060Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:01.082278 env[1216]: time="2025-05-15T10:05:01.082237219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:01.084055 env[1216]: time="2025-05-15T10:05:01.084016758Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:01.084675 env[1216]: time="2025-05-15T10:05:01.084637912Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8\"" May 15 10:05:01.087889 env[1216]: time="2025-05-15T10:05:01.087839850Z" level=info msg="CreateContainer within sandbox \"46d3a7e71d015775c6135b8be882b2993e5cf42dd85c9ed4ac2ce91b90de00ae\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 10:05:01.100450 env[1216]: time="2025-05-15T10:05:01.100391268Z" level=info msg="CreateContainer within sandbox \"46d3a7e71d015775c6135b8be882b2993e5cf42dd85c9ed4ac2ce91b90de00ae\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"320b32c1ad6b90746b1fdf2de7c29eaf0f25d2abe99c36361b7d197431898ffa\"" May 15 10:05:01.101001 env[1216]: time="2025-05-15T10:05:01.100971380Z" level=info msg="StartContainer for \"320b32c1ad6b90746b1fdf2de7c29eaf0f25d2abe99c36361b7d197431898ffa\"" May 15 10:05:01.130132 systemd[1]: Started cri-containerd-320b32c1ad6b90746b1fdf2de7c29eaf0f25d2abe99c36361b7d197431898ffa.scope. May 15 10:05:01.184000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.184000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2434 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:01.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332306233326331616436623930373436623166646632646537633239 May 15 10:05:01.184000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.184000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.184000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.184000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.184000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.184000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.184000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.184000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.184000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.184000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.184000 audit: BPF prog-id=127 op=LOAD May 15 10:05:01.184000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2434 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:01.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332306233326331616436623930373436623166646632646537633239 May 15 10:05:01.185000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.185000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.185000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.185000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.185000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.185000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.185000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.185000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.185000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.185000 audit: BPF prog-id=128 op=LOAD May 15 10:05:01.185000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2434 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:01.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332306233326331616436623930373436623166646632646537633239 May 15 10:05:01.186000 audit: BPF prog-id=128 op=UNLOAD May 15 10:05:01.186000 audit: BPF prog-id=127 op=UNLOAD May 15 10:05:01.186000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.186000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.186000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.186000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.186000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.186000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.186000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.186000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.186000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.186000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:01.186000 audit: BPF prog-id=129 op=LOAD May 15 10:05:01.186000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2434 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:01.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332306233326331616436623930373436623166646632646537633239 May 15 10:05:01.202188 env[1216]: time="2025-05-15T10:05:01.202126719Z" level=info msg="StartContainer for \"320b32c1ad6b90746b1fdf2de7c29eaf0f25d2abe99c36361b7d197431898ffa\" returns successfully" May 15 10:05:01.248036 systemd[1]: cri-containerd-320b32c1ad6b90746b1fdf2de7c29eaf0f25d2abe99c36361b7d197431898ffa.scope: Deactivated successfully. May 15 10:05:01.252000 audit: BPF prog-id=129 op=UNLOAD May 15 10:05:01.293174 env[1216]: time="2025-05-15T10:05:01.293126853Z" level=info msg="shim disconnected" id=320b32c1ad6b90746b1fdf2de7c29eaf0f25d2abe99c36361b7d197431898ffa May 15 10:05:01.293458 env[1216]: time="2025-05-15T10:05:01.293437191Z" level=warning msg="cleaning up after shim disconnected" id=320b32c1ad6b90746b1fdf2de7c29eaf0f25d2abe99c36361b7d197431898ffa namespace=k8s.io May 15 10:05:01.293524 env[1216]: time="2025-05-15T10:05:01.293510715Z" level=info msg="cleaning up dead shim" May 15 10:05:01.300854 env[1216]: time="2025-05-15T10:05:01.300803920Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:05:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2639 runtime=io.containerd.runc.v2\n" May 15 10:05:01.304930 kubelet[1951]: E0515 10:05:01.304875 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8v6wf" podUID="b24f406a-f736-4264-9766-c83335e6676c" May 15 10:05:01.351297 kubelet[1951]: E0515 10:05:01.348960 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:01.351297 kubelet[1951]: E0515 10:05:01.348983 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:01.351634 env[1216]: time="2025-05-15T10:05:01.349889926Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 10:05:01.927110 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-320b32c1ad6b90746b1fdf2de7c29eaf0f25d2abe99c36361b7d197431898ffa-rootfs.mount: Deactivated successfully. May 15 10:05:02.351743 kubelet[1951]: E0515 10:05:02.351702 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:03.312876 kubelet[1951]: E0515 10:05:03.312828 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8v6wf" podUID="b24f406a-f736-4264-9766-c83335e6676c" May 15 10:05:04.870073 env[1216]: time="2025-05-15T10:05:04.870027061Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:04.871878 env[1216]: time="2025-05-15T10:05:04.871829549Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:04.872350 env[1216]: time="2025-05-15T10:05:04.872319293Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:04.873103 env[1216]: time="2025-05-15T10:05:04.873068129Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:04.873467 env[1216]: time="2025-05-15T10:05:04.873431067Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627\"" May 15 10:05:04.876181 env[1216]: time="2025-05-15T10:05:04.876127198Z" level=info msg="CreateContainer within sandbox \"46d3a7e71d015775c6135b8be882b2993e5cf42dd85c9ed4ac2ce91b90de00ae\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 10:05:04.892696 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount114725395.mount: Deactivated successfully. May 15 10:05:04.895604 env[1216]: time="2025-05-15T10:05:04.895545581Z" level=info msg="CreateContainer within sandbox \"46d3a7e71d015775c6135b8be882b2993e5cf42dd85c9ed4ac2ce91b90de00ae\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e16ffbb4b9fcc97a575e5916a8893310398aa17a7a8f664f87ac1fb45ba42292\"" May 15 10:05:04.897348 env[1216]: time="2025-05-15T10:05:04.896155010Z" level=info msg="StartContainer for \"e16ffbb4b9fcc97a575e5916a8893310398aa17a7a8f664f87ac1fb45ba42292\"" May 15 10:05:04.916169 systemd[1]: run-containerd-runc-k8s.io-e16ffbb4b9fcc97a575e5916a8893310398aa17a7a8f664f87ac1fb45ba42292-runc.MOUALk.mount: Deactivated successfully. May 15 10:05:04.918691 systemd[1]: Started cri-containerd-e16ffbb4b9fcc97a575e5916a8893310398aa17a7a8f664f87ac1fb45ba42292.scope. May 15 10:05:04.962000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.964510 kernel: kauditd_printk_skb: 229 callbacks suppressed May 15 10:05:04.964575 kernel: audit: type=1400 audit(1747303504.962:976): avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.962000 audit[2669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2434 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:04.969441 kernel: audit: type=1300 audit(1747303504.962:976): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2434 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:04.969518 kernel: audit: type=1327 audit(1747303504.962:976): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531366666626234623966636339376135373565353931366138383933 May 15 10:05:04.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531366666626234623966636339376135373565353931366138383933 May 15 10:05:04.962000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.974222 kernel: audit: type=1400 audit(1747303504.962:977): avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.962000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.977069 kernel: audit: type=1400 audit(1747303504.962:977): avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.977147 kernel: audit: type=1400 audit(1747303504.962:977): avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.962000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.962000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.980927 kernel: audit: type=1400 audit(1747303504.962:977): avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.980993 kernel: audit: type=1400 audit(1747303504.962:977): avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.962000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.962000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.984807 kernel: audit: type=1400 audit(1747303504.962:977): avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.984866 kernel: audit: type=1400 audit(1747303504.962:977): avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.962000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.962000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.962000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.962000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.962000 audit: BPF prog-id=130 op=LOAD May 15 10:05:04.962000 audit[2669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2434 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:04.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531366666626234623966636339376135373565353931366138383933 May 15 10:05:04.963000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.963000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.963000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.963000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.963000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.963000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.963000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.963000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.963000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.963000 audit: BPF prog-id=131 op=LOAD May 15 10:05:04.963000 audit[2669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2434 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:04.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531366666626234623966636339376135373565353931366138383933 May 15 10:05:04.965000 audit: BPF prog-id=131 op=UNLOAD May 15 10:05:04.965000 audit: BPF prog-id=130 op=UNLOAD May 15 10:05:04.965000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.965000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.965000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.965000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.965000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.965000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.965000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.965000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.965000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.965000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:04.965000 audit: BPF prog-id=132 op=LOAD May 15 10:05:04.965000 audit[2669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2434 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:04.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531366666626234623966636339376135373565353931366138383933 May 15 10:05:05.040393 env[1216]: time="2025-05-15T10:05:05.040318976Z" level=info msg="StartContainer for \"e16ffbb4b9fcc97a575e5916a8893310398aa17a7a8f664f87ac1fb45ba42292\" returns successfully" May 15 10:05:05.304453 kubelet[1951]: E0515 10:05:05.304089 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8v6wf" podUID="b24f406a-f736-4264-9766-c83335e6676c" May 15 10:05:05.372358 kubelet[1951]: E0515 10:05:05.372291 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:05.603464 env[1216]: time="2025-05-15T10:05:05.603348406Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:05:05.607092 systemd[1]: cri-containerd-e16ffbb4b9fcc97a575e5916a8893310398aa17a7a8f664f87ac1fb45ba42292.scope: Deactivated successfully. May 15 10:05:05.610000 audit: BPF prog-id=132 op=UNLOAD May 15 10:05:05.633101 env[1216]: time="2025-05-15T10:05:05.633053787Z" level=info msg="shim disconnected" id=e16ffbb4b9fcc97a575e5916a8893310398aa17a7a8f664f87ac1fb45ba42292 May 15 10:05:05.633369 env[1216]: time="2025-05-15T10:05:05.633349601Z" level=warning msg="cleaning up after shim disconnected" id=e16ffbb4b9fcc97a575e5916a8893310398aa17a7a8f664f87ac1fb45ba42292 namespace=k8s.io May 15 10:05:05.633448 env[1216]: time="2025-05-15T10:05:05.633434045Z" level=info msg="cleaning up dead shim" May 15 10:05:05.635760 kubelet[1951]: I0515 10:05:05.635725 1951 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 15 10:05:05.649154 env[1216]: time="2025-05-15T10:05:05.649111134Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:05:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2708 runtime=io.containerd.runc.v2\n" May 15 10:05:05.668674 kubelet[1951]: W0515 10:05:05.668628 1951 reflector.go:561] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'localhost' and this object May 15 10:05:05.669791 kubelet[1951]: E0515 10:05:05.669741 1951 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"coredns\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"coredns\" is forbidden: User \"system:node:localhost\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\": no relationship found between node 'localhost' and this object" logger="UnhandledError" May 15 10:05:05.674428 systemd[1]: Created slice kubepods-burstable-pod9f5db866_c398_45ad_8a42_5cc212ce1355.slice. May 15 10:05:05.678512 systemd[1]: Created slice kubepods-burstable-pod5ca3009b_464d_4ecc_b330_d9060256ea98.slice. May 15 10:05:05.683090 systemd[1]: Created slice kubepods-besteffort-podb33edbce_e854_4547_85f6_10c1e7fcf595.slice. May 15 10:05:05.687397 systemd[1]: Created slice kubepods-besteffort-pod7f1f243b_eb57_4aa3_b0c4_594c99e3933a.slice. May 15 10:05:05.693108 systemd[1]: Created slice kubepods-besteffort-podcfbf95ca_356d_4e86_9b10_1c746b5559fe.slice. May 15 10:05:05.740676 kubelet[1951]: I0515 10:05:05.740634 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9f5db866-c398-45ad-8a42-5cc212ce1355-config-volume\") pod \"coredns-6f6b679f8f-2gbhj\" (UID: \"9f5db866-c398-45ad-8a42-5cc212ce1355\") " pod="kube-system/coredns-6f6b679f8f-2gbhj" May 15 10:05:05.740676 kubelet[1951]: I0515 10:05:05.740684 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g62r9\" (UniqueName: \"kubernetes.io/projected/9f5db866-c398-45ad-8a42-5cc212ce1355-kube-api-access-g62r9\") pod \"coredns-6f6b679f8f-2gbhj\" (UID: \"9f5db866-c398-45ad-8a42-5cc212ce1355\") " pod="kube-system/coredns-6f6b679f8f-2gbhj" May 15 10:05:05.740862 kubelet[1951]: I0515 10:05:05.740706 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ntjhn\" (UniqueName: \"kubernetes.io/projected/5ca3009b-464d-4ecc-b330-d9060256ea98-kube-api-access-ntjhn\") pod \"coredns-6f6b679f8f-5pxzd\" (UID: \"5ca3009b-464d-4ecc-b330-d9060256ea98\") " pod="kube-system/coredns-6f6b679f8f-5pxzd" May 15 10:05:05.740862 kubelet[1951]: I0515 10:05:05.740728 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/5ca3009b-464d-4ecc-b330-d9060256ea98-config-volume\") pod \"coredns-6f6b679f8f-5pxzd\" (UID: \"5ca3009b-464d-4ecc-b330-d9060256ea98\") " pod="kube-system/coredns-6f6b679f8f-5pxzd" May 15 10:05:05.841017 kubelet[1951]: I0515 10:05:05.840975 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ms9hq\" (UniqueName: \"kubernetes.io/projected/cfbf95ca-356d-4e86-9b10-1c746b5559fe-kube-api-access-ms9hq\") pod \"calico-kube-controllers-85df6c8f48-khsxw\" (UID: \"cfbf95ca-356d-4e86-9b10-1c746b5559fe\") " pod="calico-system/calico-kube-controllers-85df6c8f48-khsxw" May 15 10:05:05.841233 kubelet[1951]: I0515 10:05:05.841217 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7f1f243b-eb57-4aa3-b0c4-594c99e3933a-calico-apiserver-certs\") pod \"calico-apiserver-544995c86d-8l9dj\" (UID: \"7f1f243b-eb57-4aa3-b0c4-594c99e3933a\") " pod="calico-apiserver/calico-apiserver-544995c86d-8l9dj" May 15 10:05:05.841389 kubelet[1951]: I0515 10:05:05.841375 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b33edbce-e854-4547-85f6-10c1e7fcf595-calico-apiserver-certs\") pod \"calico-apiserver-544995c86d-2cmzm\" (UID: \"b33edbce-e854-4547-85f6-10c1e7fcf595\") " pod="calico-apiserver/calico-apiserver-544995c86d-2cmzm" May 15 10:05:05.841483 kubelet[1951]: I0515 10:05:05.841469 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-stfwk\" (UniqueName: \"kubernetes.io/projected/7f1f243b-eb57-4aa3-b0c4-594c99e3933a-kube-api-access-stfwk\") pod \"calico-apiserver-544995c86d-8l9dj\" (UID: \"7f1f243b-eb57-4aa3-b0c4-594c99e3933a\") " pod="calico-apiserver/calico-apiserver-544995c86d-8l9dj" May 15 10:05:05.841631 kubelet[1951]: I0515 10:05:05.841591 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f4tw9\" (UniqueName: \"kubernetes.io/projected/b33edbce-e854-4547-85f6-10c1e7fcf595-kube-api-access-f4tw9\") pod \"calico-apiserver-544995c86d-2cmzm\" (UID: \"b33edbce-e854-4547-85f6-10c1e7fcf595\") " pod="calico-apiserver/calico-apiserver-544995c86d-2cmzm" May 15 10:05:05.841689 kubelet[1951]: I0515 10:05:05.841658 1951 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cfbf95ca-356d-4e86-9b10-1c746b5559fe-tigera-ca-bundle\") pod \"calico-kube-controllers-85df6c8f48-khsxw\" (UID: \"cfbf95ca-356d-4e86-9b10-1c746b5559fe\") " pod="calico-system/calico-kube-controllers-85df6c8f48-khsxw" May 15 10:05:05.892170 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e16ffbb4b9fcc97a575e5916a8893310398aa17a7a8f664f87ac1fb45ba42292-rootfs.mount: Deactivated successfully. May 15 10:05:05.987806 env[1216]: time="2025-05-15T10:05:05.987751366Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-544995c86d-2cmzm,Uid:b33edbce-e854-4547-85f6-10c1e7fcf595,Namespace:calico-apiserver,Attempt:0,}" May 15 10:05:05.990787 env[1216]: time="2025-05-15T10:05:05.990748306Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-544995c86d-8l9dj,Uid:7f1f243b-eb57-4aa3-b0c4-594c99e3933a,Namespace:calico-apiserver,Attempt:0,}" May 15 10:05:05.996107 env[1216]: time="2025-05-15T10:05:05.996068193Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85df6c8f48-khsxw,Uid:cfbf95ca-356d-4e86-9b10-1c746b5559fe,Namespace:calico-system,Attempt:0,}" May 15 10:05:06.332013 env[1216]: time="2025-05-15T10:05:06.331944543Z" level=error msg="Failed to destroy network for sandbox \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.332626 env[1216]: time="2025-05-15T10:05:06.332529569Z" level=error msg="encountered an error cleaning up failed sandbox \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.332786 env[1216]: time="2025-05-15T10:05:06.332755299Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-544995c86d-2cmzm,Uid:b33edbce-e854-4547-85f6-10c1e7fcf595,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.332927 env[1216]: time="2025-05-15T10:05:06.332881265Z" level=error msg="Failed to destroy network for sandbox \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.333231 env[1216]: time="2025-05-15T10:05:06.333198759Z" level=error msg="encountered an error cleaning up failed sandbox \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.333379 env[1216]: time="2025-05-15T10:05:06.333253522Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-544995c86d-8l9dj,Uid:7f1f243b-eb57-4aa3-b0c4-594c99e3933a,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.334993 kubelet[1951]: E0515 10:05:06.334947 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.335362 kubelet[1951]: E0515 10:05:06.335031 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-544995c86d-8l9dj" May 15 10:05:06.335362 kubelet[1951]: E0515 10:05:06.335052 1951 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-544995c86d-8l9dj" May 15 10:05:06.335624 kubelet[1951]: E0515 10:05:06.334947 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.335624 kubelet[1951]: E0515 10:05:06.335500 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-544995c86d-2cmzm" May 15 10:05:06.335624 kubelet[1951]: E0515 10:05:06.335531 1951 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-544995c86d-2cmzm" May 15 10:05:06.335747 kubelet[1951]: E0515 10:05:06.335576 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-544995c86d-2cmzm_calico-apiserver(b33edbce-e854-4547-85f6-10c1e7fcf595)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-544995c86d-2cmzm_calico-apiserver(b33edbce-e854-4547-85f6-10c1e7fcf595)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-544995c86d-2cmzm" podUID="b33edbce-e854-4547-85f6-10c1e7fcf595" May 15 10:05:06.337424 kubelet[1951]: E0515 10:05:06.336414 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-544995c86d-8l9dj_calico-apiserver(7f1f243b-eb57-4aa3-b0c4-594c99e3933a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-544995c86d-8l9dj_calico-apiserver(7f1f243b-eb57-4aa3-b0c4-594c99e3933a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-544995c86d-8l9dj" podUID="7f1f243b-eb57-4aa3-b0c4-594c99e3933a" May 15 10:05:06.337559 env[1216]: time="2025-05-15T10:05:06.337410067Z" level=error msg="Failed to destroy network for sandbox \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.337804 env[1216]: time="2025-05-15T10:05:06.337749202Z" level=error msg="encountered an error cleaning up failed sandbox \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.337916 env[1216]: time="2025-05-15T10:05:06.337804765Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85df6c8f48-khsxw,Uid:cfbf95ca-356d-4e86-9b10-1c746b5559fe,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.338040 kubelet[1951]: E0515 10:05:06.338006 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.338091 kubelet[1951]: E0515 10:05:06.338057 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-85df6c8f48-khsxw" May 15 10:05:06.338091 kubelet[1951]: E0515 10:05:06.338076 1951 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-85df6c8f48-khsxw" May 15 10:05:06.338142 kubelet[1951]: E0515 10:05:06.338115 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-85df6c8f48-khsxw_calico-system(cfbf95ca-356d-4e86-9b10-1c746b5559fe)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-85df6c8f48-khsxw_calico-system(cfbf95ca-356d-4e86-9b10-1c746b5559fe)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-85df6c8f48-khsxw" podUID="cfbf95ca-356d-4e86-9b10-1c746b5559fe" May 15 10:05:06.376311 kubelet[1951]: E0515 10:05:06.375577 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:06.376699 env[1216]: time="2025-05-15T10:05:06.376630016Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 10:05:06.380491 kubelet[1951]: I0515 10:05:06.380451 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" May 15 10:05:06.382478 env[1216]: time="2025-05-15T10:05:06.382437155Z" level=info msg="StopPodSandbox for \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\"" May 15 10:05:06.383463 kubelet[1951]: I0515 10:05:06.383416 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" May 15 10:05:06.385172 env[1216]: time="2025-05-15T10:05:06.384129471Z" level=info msg="StopPodSandbox for \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\"" May 15 10:05:06.385410 kubelet[1951]: I0515 10:05:06.385390 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" May 15 10:05:06.385949 env[1216]: time="2025-05-15T10:05:06.385911630Z" level=info msg="StopPodSandbox for \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\"" May 15 10:05:06.418603 env[1216]: time="2025-05-15T10:05:06.418520525Z" level=error msg="StopPodSandbox for \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\" failed" error="failed to destroy network for sandbox \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.419071 kubelet[1951]: E0515 10:05:06.419019 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" May 15 10:05:06.419169 kubelet[1951]: E0515 10:05:06.419092 1951 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10"} May 15 10:05:06.419207 kubelet[1951]: E0515 10:05:06.419170 1951 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cfbf95ca-356d-4e86-9b10-1c746b5559fe\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:05:06.419207 kubelet[1951]: E0515 10:05:06.419193 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cfbf95ca-356d-4e86-9b10-1c746b5559fe\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-85df6c8f48-khsxw" podUID="cfbf95ca-356d-4e86-9b10-1c746b5559fe" May 15 10:05:06.422570 env[1216]: time="2025-05-15T10:05:06.422499782Z" level=error msg="StopPodSandbox for \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\" failed" error="failed to destroy network for sandbox \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.422801 kubelet[1951]: E0515 10:05:06.422763 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" May 15 10:05:06.422864 kubelet[1951]: E0515 10:05:06.422817 1951 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f"} May 15 10:05:06.422864 kubelet[1951]: E0515 10:05:06.422850 1951 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7f1f243b-eb57-4aa3-b0c4-594c99e3933a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:05:06.422949 kubelet[1951]: E0515 10:05:06.422871 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7f1f243b-eb57-4aa3-b0c4-594c99e3933a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-544995c86d-8l9dj" podUID="7f1f243b-eb57-4aa3-b0c4-594c99e3933a" May 15 10:05:06.439058 env[1216]: time="2025-05-15T10:05:06.438974997Z" level=error msg="StopPodSandbox for \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\" failed" error="failed to destroy network for sandbox \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.439496 kubelet[1951]: E0515 10:05:06.439345 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" May 15 10:05:06.439496 kubelet[1951]: E0515 10:05:06.439398 1951 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4"} May 15 10:05:06.439496 kubelet[1951]: E0515 10:05:06.439440 1951 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b33edbce-e854-4547-85f6-10c1e7fcf595\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:05:06.439496 kubelet[1951]: E0515 10:05:06.439463 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b33edbce-e854-4547-85f6-10c1e7fcf595\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-544995c86d-2cmzm" podUID="b33edbce-e854-4547-85f6-10c1e7fcf595" May 15 10:05:06.877660 kubelet[1951]: E0515 10:05:06.877584 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:06.878206 env[1216]: time="2025-05-15T10:05:06.878163264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-2gbhj,Uid:9f5db866-c398-45ad-8a42-5cc212ce1355,Namespace:kube-system,Attempt:0,}" May 15 10:05:06.883104 kubelet[1951]: E0515 10:05:06.883066 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:06.884592 env[1216]: time="2025-05-15T10:05:06.883648469Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-5pxzd,Uid:5ca3009b-464d-4ecc-b330-d9060256ea98,Namespace:kube-system,Attempt:0,}" May 15 10:05:06.951219 env[1216]: time="2025-05-15T10:05:06.951151680Z" level=error msg="Failed to destroy network for sandbox \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.951594 env[1216]: time="2025-05-15T10:05:06.951546017Z" level=error msg="encountered an error cleaning up failed sandbox \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.951732 env[1216]: time="2025-05-15T10:05:06.951610860Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-2gbhj,Uid:9f5db866-c398-45ad-8a42-5cc212ce1355,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.951922 kubelet[1951]: E0515 10:05:06.951868 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.951976 kubelet[1951]: E0515 10:05:06.951948 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-2gbhj" May 15 10:05:06.951976 kubelet[1951]: E0515 10:05:06.951967 1951 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-2gbhj" May 15 10:05:06.952036 kubelet[1951]: E0515 10:05:06.952016 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-2gbhj_kube-system(9f5db866-c398-45ad-8a42-5cc212ce1355)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-2gbhj_kube-system(9f5db866-c398-45ad-8a42-5cc212ce1355)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-2gbhj" podUID="9f5db866-c398-45ad-8a42-5cc212ce1355" May 15 10:05:06.966740 env[1216]: time="2025-05-15T10:05:06.966670212Z" level=error msg="Failed to destroy network for sandbox \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.967062 env[1216]: time="2025-05-15T10:05:06.967020987Z" level=error msg="encountered an error cleaning up failed sandbox \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.967111 env[1216]: time="2025-05-15T10:05:06.967077510Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-5pxzd,Uid:5ca3009b-464d-4ecc-b330-d9060256ea98,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.967403 kubelet[1951]: E0515 10:05:06.967359 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:06.967457 kubelet[1951]: E0515 10:05:06.967422 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-5pxzd" May 15 10:05:06.967457 kubelet[1951]: E0515 10:05:06.967444 1951 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-5pxzd" May 15 10:05:06.967534 kubelet[1951]: E0515 10:05:06.967500 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-5pxzd_kube-system(5ca3009b-464d-4ecc-b330-d9060256ea98)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-5pxzd_kube-system(5ca3009b-464d-4ecc-b330-d9060256ea98)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-5pxzd" podUID="5ca3009b-464d-4ecc-b330-d9060256ea98" May 15 10:05:07.309577 systemd[1]: Created slice kubepods-besteffort-podb24f406a_f736_4264_9766_c83335e6676c.slice. May 15 10:05:07.313116 env[1216]: time="2025-05-15T10:05:07.313075301Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8v6wf,Uid:b24f406a-f736-4264-9766-c83335e6676c,Namespace:calico-system,Attempt:0,}" May 15 10:05:07.364075 env[1216]: time="2025-05-15T10:05:07.364010121Z" level=error msg="Failed to destroy network for sandbox \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:07.364449 env[1216]: time="2025-05-15T10:05:07.364406658Z" level=error msg="encountered an error cleaning up failed sandbox \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:07.364505 env[1216]: time="2025-05-15T10:05:07.364464621Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8v6wf,Uid:b24f406a-f736-4264-9766-c83335e6676c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:07.365064 kubelet[1951]: E0515 10:05:07.364681 1951 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:07.365064 kubelet[1951]: E0515 10:05:07.364743 1951 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8v6wf" May 15 10:05:07.365064 kubelet[1951]: E0515 10:05:07.364762 1951 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8v6wf" May 15 10:05:07.365430 kubelet[1951]: E0515 10:05:07.364811 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-8v6wf_calico-system(b24f406a-f736-4264-9766-c83335e6676c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-8v6wf_calico-system(b24f406a-f736-4264-9766-c83335e6676c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8v6wf" podUID="b24f406a-f736-4264-9766-c83335e6676c" May 15 10:05:07.388932 kubelet[1951]: I0515 10:05:07.388308 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" May 15 10:05:07.390292 kubelet[1951]: I0515 10:05:07.390073 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" May 15 10:05:07.390395 env[1216]: time="2025-05-15T10:05:07.390229564Z" level=info msg="StopPodSandbox for \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\"" May 15 10:05:07.390663 env[1216]: time="2025-05-15T10:05:07.390638301Z" level=info msg="StopPodSandbox for \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\"" May 15 10:05:07.391131 kubelet[1951]: I0515 10:05:07.391080 1951 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" May 15 10:05:07.391710 env[1216]: time="2025-05-15T10:05:07.391664745Z" level=info msg="StopPodSandbox for \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\"" May 15 10:05:07.417927 env[1216]: time="2025-05-15T10:05:07.417857706Z" level=error msg="StopPodSandbox for \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\" failed" error="failed to destroy network for sandbox \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:07.418136 kubelet[1951]: E0515 10:05:07.418096 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" May 15 10:05:07.418212 kubelet[1951]: E0515 10:05:07.418147 1951 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20"} May 15 10:05:07.418212 kubelet[1951]: E0515 10:05:07.418186 1951 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5ca3009b-464d-4ecc-b330-d9060256ea98\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:05:07.418300 kubelet[1951]: E0515 10:05:07.418207 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5ca3009b-464d-4ecc-b330-d9060256ea98\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-5pxzd" podUID="5ca3009b-464d-4ecc-b330-d9060256ea98" May 15 10:05:07.420408 env[1216]: time="2025-05-15T10:05:07.420334372Z" level=error msg="StopPodSandbox for \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\" failed" error="failed to destroy network for sandbox \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:07.420648 kubelet[1951]: E0515 10:05:07.420576 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" May 15 10:05:07.420714 kubelet[1951]: E0515 10:05:07.420648 1951 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f"} May 15 10:05:07.420714 kubelet[1951]: E0515 10:05:07.420680 1951 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9f5db866-c398-45ad-8a42-5cc212ce1355\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:05:07.420714 kubelet[1951]: E0515 10:05:07.420700 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9f5db866-c398-45ad-8a42-5cc212ce1355\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-2gbhj" podUID="9f5db866-c398-45ad-8a42-5cc212ce1355" May 15 10:05:07.429463 env[1216]: time="2025-05-15T10:05:07.429382880Z" level=error msg="StopPodSandbox for \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\" failed" error="failed to destroy network for sandbox \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:05:07.429703 kubelet[1951]: E0515 10:05:07.429647 1951 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" May 15 10:05:07.429703 kubelet[1951]: E0515 10:05:07.429697 1951 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f"} May 15 10:05:07.429792 kubelet[1951]: E0515 10:05:07.429732 1951 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b24f406a-f736-4264-9766-c83335e6676c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:05:07.429792 kubelet[1951]: E0515 10:05:07.429755 1951 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b24f406a-f736-4264-9766-c83335e6676c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8v6wf" podUID="b24f406a-f736-4264-9766-c83335e6676c" May 15 10:05:07.891217 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20-shm.mount: Deactivated successfully. May 15 10:05:07.891325 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f-shm.mount: Deactivated successfully. May 15 10:05:11.590234 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1472978314.mount: Deactivated successfully. May 15 10:05:11.807601 env[1216]: time="2025-05-15T10:05:11.807519243Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:11.810566 env[1216]: time="2025-05-15T10:05:11.810324186Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:11.811755 env[1216]: time="2025-05-15T10:05:11.811718797Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:11.813387 env[1216]: time="2025-05-15T10:05:11.813038886Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:11.814322 env[1216]: time="2025-05-15T10:05:11.814274251Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057\"" May 15 10:05:11.831674 env[1216]: time="2025-05-15T10:05:11.831613607Z" level=info msg="CreateContainer within sandbox \"46d3a7e71d015775c6135b8be882b2993e5cf42dd85c9ed4ac2ce91b90de00ae\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 10:05:11.845800 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount339886245.mount: Deactivated successfully. May 15 10:05:11.848037 env[1216]: time="2025-05-15T10:05:11.847983567Z" level=info msg="CreateContainer within sandbox \"46d3a7e71d015775c6135b8be882b2993e5cf42dd85c9ed4ac2ce91b90de00ae\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"c06509ba7285598d928fd11235148efc3799d6ff32f92301ef6bdea460cfeb17\"" May 15 10:05:11.848836 env[1216]: time="2025-05-15T10:05:11.848730395Z" level=info msg="StartContainer for \"c06509ba7285598d928fd11235148efc3799d6ff32f92301ef6bdea460cfeb17\"" May 15 10:05:11.867665 systemd[1]: Started cri-containerd-c06509ba7285598d928fd11235148efc3799d6ff32f92301ef6bdea460cfeb17.scope. May 15 10:05:11.910000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.914666 kernel: kauditd_printk_skb: 34 callbacks suppressed May 15 10:05:11.914787 kernel: audit: type=1400 audit(1747303511.910:983): avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.914821 kernel: audit: type=1300 audit(1747303511.910:983): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2434 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:11.910000 audit[3110]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2434 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:11.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330363530396261373238353539386439323866643131323335313438 May 15 10:05:11.920070 kernel: audit: type=1327 audit(1747303511.910:983): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330363530396261373238353539386439323866643131323335313438 May 15 10:05:11.920248 kernel: audit: type=1400 audit(1747303511.910:984): avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.910000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.921892 kernel: audit: type=1400 audit(1747303511.910:984): avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.910000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.923645 kernel: audit: type=1400 audit(1747303511.910:984): avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.910000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.910000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.927572 kernel: audit: type=1400 audit(1747303511.910:984): avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.927686 kernel: audit: type=1400 audit(1747303511.910:984): avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.910000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.929353 kernel: audit: type=1400 audit(1747303511.910:984): avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.910000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.931172 kernel: audit: type=1400 audit(1747303511.910:984): avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.910000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.910000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.910000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.910000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.910000 audit: BPF prog-id=133 op=LOAD May 15 10:05:11.910000 audit[3110]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2434 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:11.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330363530396261373238353539386439323866643131323335313438 May 15 10:05:11.912000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.912000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.912000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.912000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.912000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.912000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.912000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.912000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.912000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.912000 audit: BPF prog-id=134 op=LOAD May 15 10:05:11.912000 audit[3110]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2434 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:11.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330363530396261373238353539386439323866643131323335313438 May 15 10:05:11.913000 audit: BPF prog-id=134 op=UNLOAD May 15 10:05:11.913000 audit: BPF prog-id=133 op=UNLOAD May 15 10:05:11.913000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.913000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.913000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.913000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.913000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.913000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.913000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.913000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.913000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.913000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:11.913000 audit: BPF prog-id=135 op=LOAD May 15 10:05:11.913000 audit[3110]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2434 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:11.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330363530396261373238353539386439323866643131323335313438 May 15 10:05:11.938618 env[1216]: time="2025-05-15T10:05:11.936829305Z" level=info msg="StartContainer for \"c06509ba7285598d928fd11235148efc3799d6ff32f92301ef6bdea460cfeb17\" returns successfully" May 15 10:05:12.145835 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 10:05:12.146000 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 10:05:12.404070 kubelet[1951]: E0515 10:05:12.404009 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:12.426425 kubelet[1951]: I0515 10:05:12.426344 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-pftvr" podStartSLOduration=1.73048235 podStartE2EDuration="15.426324507s" podCreationTimestamp="2025-05-15 10:04:57 +0000 UTC" firstStartedPulling="2025-05-15 10:04:58.11914952 +0000 UTC m=+13.906390680" lastFinishedPulling="2025-05-15 10:05:11.814991677 +0000 UTC m=+27.602232837" observedRunningTime="2025-05-15 10:05:12.425936573 +0000 UTC m=+28.213177733" watchObservedRunningTime="2025-05-15 10:05:12.426324507 +0000 UTC m=+28.213565667" May 15 10:05:13.405448 kubelet[1951]: E0515 10:05:13.405243 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:13.432742 systemd[1]: run-containerd-runc-k8s.io-c06509ba7285598d928fd11235148efc3799d6ff32f92301ef6bdea460cfeb17-runc.kCdlih.mount: Deactivated successfully. May 15 10:05:13.434000 audit[3243]: AVC avc: denied { write } for pid=3243 comm="tee" name="fd" dev="proc" ino=20640 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:05:13.434000 audit[3243]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe50baa2e a2=241 a3=1b6 items=1 ppid=3209 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.434000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 10:05:13.434000 audit: PATH item=0 name="/dev/fd/63" inode=18738 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:05:13.434000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:05:13.437000 audit[3246]: AVC avc: denied { write } for pid=3246 comm="tee" name="fd" dev="proc" ino=20644 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:05:13.437000 audit[3246]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcab33a2e a2=241 a3=1b6 items=1 ppid=3199 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.437000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 10:05:13.437000 audit: PATH item=0 name="/dev/fd/63" inode=18739 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:05:13.437000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:05:13.445000 audit[3255]: AVC avc: denied { write } for pid=3255 comm="tee" name="fd" dev="proc" ino=18104 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:05:13.445000 audit[3255]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdd47da2f a2=241 a3=1b6 items=1 ppid=3222 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.445000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 10:05:13.445000 audit: PATH item=0 name="/dev/fd/63" inode=18094 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:05:13.445000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:05:13.456000 audit[3283]: AVC avc: denied { write } for pid=3283 comm="tee" name="fd" dev="proc" ino=20656 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:05:13.456000 audit[3283]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdb5eca2e a2=241 a3=1b6 items=1 ppid=3207 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.456000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 10:05:13.456000 audit: PATH item=0 name="/dev/fd/63" inode=20651 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:05:13.456000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:05:13.475000 audit[3273]: AVC avc: denied { write } for pid=3273 comm="tee" name="fd" dev="proc" ino=18112 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:05:13.475000 audit[3273]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe006aa30 a2=241 a3=1b6 items=1 ppid=3220 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.475000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 10:05:13.475000 audit: PATH item=0 name="/dev/fd/63" inode=18101 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:05:13.475000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:05:13.476000 audit[3295]: AVC avc: denied { write } for pid=3295 comm="tee" name="fd" dev="proc" ino=20660 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:05:13.476000 audit[3295]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffda2f3a1e a2=241 a3=1b6 items=1 ppid=3227 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.476000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 10:05:13.476000 audit: PATH item=0 name="/dev/fd/63" inode=18106 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:05:13.476000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:05:13.478000 audit[3299]: AVC avc: denied { write } for pid=3299 comm="tee" name="fd" dev="proc" ino=18116 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:05:13.478000 audit[3299]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdef37a1f a2=241 a3=1b6 items=1 ppid=3204 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.478000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 10:05:13.478000 audit: PATH item=0 name="/dev/fd/63" inode=18109 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:05:13.478000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit: BPF prog-id=136 op=LOAD May 15 10:05:13.611000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdc1b5b98 a2=98 a3=ffffdc1b5b88 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.611000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.611000 audit: BPF prog-id=136 op=UNLOAD May 15 10:05:13.611000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit: BPF prog-id=137 op=LOAD May 15 10:05:13.611000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdc1b5828 a2=74 a3=95 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.611000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.611000 audit: BPF prog-id=137 op=UNLOAD May 15 10:05:13.611000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.611000 audit: BPF prog-id=138 op=LOAD May 15 10:05:13.611000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdc1b5888 a2=94 a3=2 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.611000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.611000 audit: BPF prog-id=138 op=UNLOAD May 15 10:05:13.696000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.696000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.696000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.696000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.696000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.696000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.696000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.696000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.696000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.696000 audit: BPF prog-id=139 op=LOAD May 15 10:05:13.696000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdc1b5848 a2=40 a3=ffffdc1b5878 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.696000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.696000 audit: BPF prog-id=139 op=UNLOAD May 15 10:05:13.696000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.696000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffdc1b5960 a2=50 a3=0 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.696000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.704000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.704000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc1b58b8 a2=28 a3=ffffdc1b59e8 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.704000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.704000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc1b58e8 a2=28 a3=ffffdc1b5a18 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.704000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.704000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc1b5798 a2=28 a3=ffffdc1b58c8 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.704000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.704000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc1b5908 a2=28 a3=ffffdc1b5a38 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.704000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.704000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc1b58e8 a2=28 a3=ffffdc1b5a18 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.704000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.704000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc1b58d8 a2=28 a3=ffffdc1b5a08 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.704000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.704000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc1b5908 a2=28 a3=ffffdc1b5a38 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.704000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.704000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc1b58e8 a2=28 a3=ffffdc1b5a18 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.704000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.704000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc1b5908 a2=28 a3=ffffdc1b5a38 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.704000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.704000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc1b58d8 a2=28 a3=ffffdc1b5a08 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.704000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.704000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc1b5958 a2=28 a3=ffffdc1b5a98 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdc1b5690 a2=50 a3=0 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.705000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.705000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit: BPF prog-id=140 op=LOAD May 15 10:05:13.705000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdc1b5698 a2=94 a3=5 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.705000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.705000 audit: BPF prog-id=140 op=UNLOAD May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdc1b57a0 a2=50 a3=0 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.705000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.705000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffdc1b58e8 a2=4 a3=3 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.705000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.705000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { confidentiality } for pid=3345 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:05:13.705000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdc1b58c8 a2=94 a3=6 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.705000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.705000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { confidentiality } for pid=3345 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:05:13.705000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdc1b5098 a2=94 a3=83 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.705000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.705000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.705000 audit[3345]: AVC avc: denied { confidentiality } for pid=3345 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:05:13.705000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdc1b5098 a2=94 a3=83 items=0 ppid=3213 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.705000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:05:13.716000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit: BPF prog-id=141 op=LOAD May 15 10:05:13.716000 audit[3349]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd255ffb8 a2=98 a3=ffffd255ffa8 items=0 ppid=3213 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.716000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:05:13.716000 audit: BPF prog-id=141 op=UNLOAD May 15 10:05:13.716000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit: BPF prog-id=142 op=LOAD May 15 10:05:13.716000 audit[3349]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd255fe68 a2=74 a3=95 items=0 ppid=3213 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.716000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:05:13.716000 audit: BPF prog-id=142 op=UNLOAD May 15 10:05:13.716000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { perfmon } for pid=3349 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit[3349]: AVC avc: denied { bpf } for pid=3349 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.716000 audit: BPF prog-id=143 op=LOAD May 15 10:05:13.716000 audit[3349]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd255fe98 a2=40 a3=ffffd255fec8 items=0 ppid=3213 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.716000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:05:13.716000 audit: BPF prog-id=143 op=UNLOAD May 15 10:05:13.759968 systemd-networkd[1052]: vxlan.calico: Link UP May 15 10:05:13.759973 systemd-networkd[1052]: vxlan.calico: Gained carrier May 15 10:05:13.789000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.789000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.789000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.789000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.789000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.789000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.789000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.789000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.789000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.789000 audit: BPF prog-id=144 op=LOAD May 15 10:05:13.789000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffef9dddc8 a2=98 a3=ffffef9dddb8 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.790000 audit: BPF prog-id=144 op=UNLOAD May 15 10:05:13.790000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.790000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.790000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.790000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.790000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.790000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.790000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.790000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.790000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.790000 audit: BPF prog-id=145 op=LOAD May 15 10:05:13.790000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffef9ddaa8 a2=74 a3=95 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.791000 audit: BPF prog-id=145 op=UNLOAD May 15 10:05:13.791000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.791000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.791000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.791000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.791000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.791000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.791000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.791000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.791000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.791000 audit: BPF prog-id=146 op=LOAD May 15 10:05:13.791000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffef9ddb08 a2=94 a3=2 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.792000 audit: BPF prog-id=146 op=UNLOAD May 15 10:05:13.792000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.792000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffef9ddb38 a2=28 a3=ffffef9ddc68 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.792000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.792000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffef9ddb68 a2=28 a3=ffffef9ddc98 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.792000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.792000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffef9dda18 a2=28 a3=ffffef9ddb48 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.792000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.792000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffef9ddb88 a2=28 a3=ffffef9ddcb8 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.793000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.793000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffef9ddb68 a2=28 a3=ffffef9ddc98 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.793000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.793000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.793000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffef9ddb58 a2=28 a3=ffffef9ddc88 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.793000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.793000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.793000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffef9ddb88 a2=28 a3=ffffef9ddcb8 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.793000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.793000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.793000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffef9ddb68 a2=28 a3=ffffef9ddc98 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.793000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.793000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.793000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffef9ddb88 a2=28 a3=ffffef9ddcb8 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.793000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.793000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.793000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffef9ddb58 a2=28 a3=ffffef9ddc88 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.793000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.793000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.793000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffef9ddbd8 a2=28 a3=ffffef9ddd18 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.793000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.793000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.793000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.793000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.793000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.793000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.793000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.793000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.793000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.793000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.793000 audit: BPF prog-id=147 op=LOAD May 15 10:05:13.793000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffef9dd9f8 a2=40 a3=ffffef9dda28 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.793000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.798000 audit: BPF prog-id=147 op=UNLOAD May 15 10:05:13.799000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.799000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffef9dda20 a2=50 a3=0 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.799000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.799000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.799000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffef9dda20 a2=50 a3=0 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.799000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit: BPF prog-id=148 op=LOAD May 15 10:05:13.800000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffef9dd188 a2=94 a3=2 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.800000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.800000 audit: BPF prog-id=148 op=UNLOAD May 15 10:05:13.800000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.800000 audit: BPF prog-id=149 op=LOAD May 15 10:05:13.800000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffef9dd318 a2=94 a3=30 items=0 ppid=3213 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.800000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:05:13.804000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.804000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.804000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.804000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.804000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.804000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.804000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.804000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.804000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.804000 audit: BPF prog-id=150 op=LOAD May 15 10:05:13.804000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffcb83268 a2=98 a3=fffffcb83258 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.804000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.804000 audit: BPF prog-id=150 op=UNLOAD May 15 10:05:13.805000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit: BPF prog-id=151 op=LOAD May 15 10:05:13.805000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffcb82ef8 a2=74 a3=95 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.805000 audit: BPF prog-id=151 op=UNLOAD May 15 10:05:13.805000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.805000 audit: BPF prog-id=152 op=LOAD May 15 10:05:13.805000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffcb82f58 a2=94 a3=2 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.806000 audit: BPF prog-id=152 op=UNLOAD May 15 10:05:13.891000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.891000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.891000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.891000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.891000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.891000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.891000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.891000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.891000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.891000 audit: BPF prog-id=153 op=LOAD May 15 10:05:13.891000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffcb82f18 a2=40 a3=fffffcb82f48 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.891000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.892000 audit: BPF prog-id=153 op=UNLOAD May 15 10:05:13.892000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.892000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffffcb83030 a2=50 a3=0 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.892000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.901000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.901000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffcb82f88 a2=28 a3=fffffcb830b8 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.901000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.901000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.901000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffcb82fb8 a2=28 a3=fffffcb830e8 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.901000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.902000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.902000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffcb82e68 a2=28 a3=fffffcb82f98 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.902000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.902000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffcb82fd8 a2=28 a3=fffffcb83108 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.902000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.902000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffcb82fb8 a2=28 a3=fffffcb830e8 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.902000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.902000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffcb82fa8 a2=28 a3=fffffcb830d8 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.902000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.902000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffcb82fd8 a2=28 a3=fffffcb83108 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.902000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.902000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffcb82fb8 a2=28 a3=fffffcb830e8 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.902000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.902000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffcb82fd8 a2=28 a3=fffffcb83108 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.902000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.902000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffcb82fa8 a2=28 a3=fffffcb830d8 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.902000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.903000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.903000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffcb83028 a2=28 a3=fffffcb83168 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.903000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.903000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.903000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffcb82d60 a2=50 a3=0 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.903000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.903000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.903000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.903000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.903000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.903000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.903000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.903000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.903000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.903000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.903000 audit: BPF prog-id=154 op=LOAD May 15 10:05:13.903000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffcb82d68 a2=94 a3=5 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.903000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.904000 audit: BPF prog-id=154 op=UNLOAD May 15 10:05:13.904000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.904000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffcb82e70 a2=50 a3=0 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.904000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.904000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.904000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffffcb82fb8 a2=4 a3=3 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.904000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.904000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.904000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.904000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.904000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.904000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.904000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.904000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.904000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.904000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.904000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.904000 audit[3386]: AVC avc: denied { confidentiality } for pid=3386 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:05:13.904000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffcb82f98 a2=94 a3=6 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.904000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.905000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.905000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.905000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.905000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.905000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.905000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.905000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.905000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.905000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.905000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.905000 audit[3386]: AVC avc: denied { confidentiality } for pid=3386 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:05:13.905000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffcb82768 a2=94 a3=83 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.905000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.906000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.906000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.906000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.906000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.906000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.906000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.906000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.906000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.906000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.906000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.906000 audit[3386]: AVC avc: denied { confidentiality } for pid=3386 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:05:13.906000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffcb82768 a2=94 a3=83 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.906000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.906000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.906000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffcb841a8 a2=10 a3=fffffcb84298 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.906000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.906000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.906000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffcb84068 a2=10 a3=fffffcb84158 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.906000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.906000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.906000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffcb83fd8 a2=10 a3=fffffcb84158 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.906000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.906000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:13.906000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffcb83fd8 a2=10 a3=fffffcb84158 items=0 ppid=3213 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.906000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:05:13.916000 audit: BPF prog-id=149 op=UNLOAD May 15 10:05:13.963000 audit[3409]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3409 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:05:13.963000 audit[3409]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffeb20ac30 a2=0 a3=ffffbc83bfa8 items=0 ppid=3213 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.963000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:05:13.971000 audit[3408]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3408 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:05:13.971000 audit[3408]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffd491c250 a2=0 a3=ffff913b1fa8 items=0 ppid=3213 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.971000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:05:13.977000 audit[3407]: NETFILTER_CFG table=raw:99 family=2 entries=21 op=nft_register_chain pid=3407 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:05:13.977000 audit[3407]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=fffffd44a9d0 a2=0 a3=ffff8aa8efa8 items=0 ppid=3213 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.977000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:05:13.978000 audit[3412]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3412 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:05:13.978000 audit[3412]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffdd8c86e0 a2=0 a3=ffff9a65dfa8 items=0 ppid=3213 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:13.978000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:05:14.407407 kubelet[1951]: E0515 10:05:14.407361 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:14.836415 systemd-networkd[1052]: vxlan.calico: Gained IPv6LL May 15 10:05:15.421578 systemd[1]: Started sshd@7-10.0.0.18:22-10.0.0.1:46868.service. May 15 10:05:15.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.18:22-10.0.0.1:46868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:15.464000 audit[3445]: USER_ACCT pid=3445 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:15.465205 sshd[3445]: Accepted publickey for core from 10.0.0.1 port 46868 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:05:15.465000 audit[3445]: CRED_ACQ pid=3445 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:15.465000 audit[3445]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff7b8c680 a2=3 a3=1 items=0 ppid=1 pid=3445 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:15.465000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:05:15.466618 sshd[3445]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:05:15.470182 systemd-logind[1208]: New session 8 of user core. May 15 10:05:15.471102 systemd[1]: Started session-8.scope. May 15 10:05:15.474000 audit[3445]: USER_START pid=3445 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:15.476000 audit[3449]: CRED_ACQ pid=3449 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:15.641629 sshd[3445]: pam_unix(sshd:session): session closed for user core May 15 10:05:15.644000 audit[3445]: USER_END pid=3445 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:15.645000 audit[3445]: CRED_DISP pid=3445 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:15.646991 systemd[1]: sshd@7-10.0.0.18:22-10.0.0.1:46868.service: Deactivated successfully. May 15 10:05:15.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.18:22-10.0.0.1:46868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:15.647765 systemd[1]: session-8.scope: Deactivated successfully. May 15 10:05:15.648370 systemd-logind[1208]: Session 8 logged out. Waiting for processes to exit. May 15 10:05:15.649147 systemd-logind[1208]: Removed session 8. May 15 10:05:19.305145 env[1216]: time="2025-05-15T10:05:19.305092192Z" level=info msg="StopPodSandbox for \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\"" May 15 10:05:19.636176 env[1216]: 2025-05-15 10:05:19.391 [INFO][3484] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" May 15 10:05:19.636176 env[1216]: 2025-05-15 10:05:19.393 [INFO][3484] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" iface="eth0" netns="/var/run/netns/cni-eb5d7b3b-34ba-2f91-5e75-a529a30f1a4d" May 15 10:05:19.636176 env[1216]: 2025-05-15 10:05:19.394 [INFO][3484] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" iface="eth0" netns="/var/run/netns/cni-eb5d7b3b-34ba-2f91-5e75-a529a30f1a4d" May 15 10:05:19.636176 env[1216]: 2025-05-15 10:05:19.395 [INFO][3484] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" iface="eth0" netns="/var/run/netns/cni-eb5d7b3b-34ba-2f91-5e75-a529a30f1a4d" May 15 10:05:19.636176 env[1216]: 2025-05-15 10:05:19.395 [INFO][3484] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" May 15 10:05:19.636176 env[1216]: 2025-05-15 10:05:19.395 [INFO][3484] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" May 15 10:05:19.636176 env[1216]: 2025-05-15 10:05:19.618 [INFO][3493] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" HandleID="k8s-pod-network.a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" Workload="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" May 15 10:05:19.636176 env[1216]: 2025-05-15 10:05:19.619 [INFO][3493] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:19.636176 env[1216]: 2025-05-15 10:05:19.619 [INFO][3493] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:19.636176 env[1216]: 2025-05-15 10:05:19.630 [WARNING][3493] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" HandleID="k8s-pod-network.a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" Workload="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" May 15 10:05:19.636176 env[1216]: 2025-05-15 10:05:19.630 [INFO][3493] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" HandleID="k8s-pod-network.a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" Workload="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" May 15 10:05:19.636176 env[1216]: 2025-05-15 10:05:19.632 [INFO][3493] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:19.636176 env[1216]: 2025-05-15 10:05:19.634 [INFO][3484] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" May 15 10:05:19.637501 env[1216]: time="2025-05-15T10:05:19.637391309Z" level=info msg="TearDown network for sandbox \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\" successfully" May 15 10:05:19.637501 env[1216]: time="2025-05-15T10:05:19.637435830Z" level=info msg="StopPodSandbox for \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\" returns successfully" May 15 10:05:19.638149 kubelet[1951]: E0515 10:05:19.637799 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:19.639431 systemd[1]: run-netns-cni\x2deb5d7b3b\x2d34ba\x2d2f91\x2d5e75\x2da529a30f1a4d.mount: Deactivated successfully. May 15 10:05:19.640585 env[1216]: time="2025-05-15T10:05:19.639531889Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-2gbhj,Uid:9f5db866-c398-45ad-8a42-5cc212ce1355,Namespace:kube-system,Attempt:1,}" May 15 10:05:19.885914 systemd-networkd[1052]: cali003d6e4caf8: Link UP May 15 10:05:19.887456 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:05:19.887536 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali003d6e4caf8: link becomes ready May 15 10:05:19.888158 systemd-networkd[1052]: cali003d6e4caf8: Gained carrier May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.782 [INFO][3502] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0 coredns-6f6b679f8f- kube-system 9f5db866-c398-45ad-8a42-5cc212ce1355 803 0 2025-05-15 10:04:50 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-2gbhj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali003d6e4caf8 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" Namespace="kube-system" Pod="coredns-6f6b679f8f-2gbhj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--2gbhj-" May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.782 [INFO][3502] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" Namespace="kube-system" Pod="coredns-6f6b679f8f-2gbhj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.824 [INFO][3516] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" HandleID="k8s-pod-network.40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" Workload="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.839 [INFO][3516] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" HandleID="k8s-pod-network.40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" Workload="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400058a6c0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-2gbhj", "timestamp":"2025-05-15 10:05:19.824218952 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.840 [INFO][3516] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.840 [INFO][3516] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.840 [INFO][3516] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.842 [INFO][3516] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" host="localhost" May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.852 [INFO][3516] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.859 [INFO][3516] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.861 [INFO][3516] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.864 [INFO][3516] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.864 [INFO][3516] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" host="localhost" May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.867 [INFO][3516] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773 May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.871 [INFO][3516] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" host="localhost" May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.878 [INFO][3516] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" host="localhost" May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.878 [INFO][3516] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" host="localhost" May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.878 [INFO][3516] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:19.905571 env[1216]: 2025-05-15 10:05:19.878 [INFO][3516] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" HandleID="k8s-pod-network.40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" Workload="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" May 15 10:05:19.907162 env[1216]: 2025-05-15 10:05:19.881 [INFO][3502] cni-plugin/k8s.go 386: Populated endpoint ContainerID="40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" Namespace="kube-system" Pod="coredns-6f6b679f8f-2gbhj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"9f5db866-c398-45ad-8a42-5cc212ce1355", ResourceVersion:"803", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-2gbhj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali003d6e4caf8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:19.907162 env[1216]: 2025-05-15 10:05:19.881 [INFO][3502] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" Namespace="kube-system" Pod="coredns-6f6b679f8f-2gbhj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" May 15 10:05:19.907162 env[1216]: 2025-05-15 10:05:19.881 [INFO][3502] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali003d6e4caf8 ContainerID="40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" Namespace="kube-system" Pod="coredns-6f6b679f8f-2gbhj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" May 15 10:05:19.907162 env[1216]: 2025-05-15 10:05:19.887 [INFO][3502] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" Namespace="kube-system" Pod="coredns-6f6b679f8f-2gbhj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" May 15 10:05:19.907162 env[1216]: 2025-05-15 10:05:19.889 [INFO][3502] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" Namespace="kube-system" Pod="coredns-6f6b679f8f-2gbhj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"9f5db866-c398-45ad-8a42-5cc212ce1355", ResourceVersion:"803", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773", Pod:"coredns-6f6b679f8f-2gbhj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali003d6e4caf8", MAC:"da:10:29:e3:f6:93", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:19.907162 env[1216]: 2025-05-15 10:05:19.901 [INFO][3502] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773" Namespace="kube-system" Pod="coredns-6f6b679f8f-2gbhj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" May 15 10:05:19.914000 audit[3539]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3539 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:05:19.917323 kernel: kauditd_printk_skb: 559 callbacks suppressed May 15 10:05:19.917430 kernel: audit: type=1325 audit(1747303519.914:1100): table=filter:101 family=2 entries=34 op=nft_register_chain pid=3539 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:05:19.917459 kernel: audit: type=1300 audit(1747303519.914:1100): arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffd1f98900 a2=0 a3=ffffba1c3fa8 items=0 ppid=3213 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:19.914000 audit[3539]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffd1f98900 a2=0 a3=ffffba1c3fa8 items=0 ppid=3213 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:19.920317 kernel: audit: type=1327 audit(1747303519.914:1100): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:05:19.914000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:05:19.925642 env[1216]: time="2025-05-15T10:05:19.925555257Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:05:19.925784 env[1216]: time="2025-05-15T10:05:19.925656220Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:05:19.925784 env[1216]: time="2025-05-15T10:05:19.925683981Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:05:19.925989 env[1216]: time="2025-05-15T10:05:19.925950548Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773 pid=3550 runtime=io.containerd.runc.v2 May 15 10:05:19.946579 systemd[1]: Started cri-containerd-40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773.scope. May 15 10:05:19.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.977431 kernel: audit: type=1400 audit(1747303519.973:1101): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.977488 kernel: audit: type=1400 audit(1747303519.973:1102): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.977512 kernel: audit: type=1400 audit(1747303519.973:1103): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.981056 kernel: audit: type=1400 audit(1747303519.973:1104): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.981110 kernel: audit: type=1400 audit(1747303519.973:1105): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.984752 kernel: audit: type=1400 audit(1747303519.973:1106): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.984822 kernel: audit: type=1400 audit(1747303519.973:1107): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.975000 audit: BPF prog-id=155 op=LOAD May 15 10:05:19.979000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.979000 audit[3562]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3550 pid=3562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:19.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430663631326364643063663235356437356362616138383731616636 May 15 10:05:19.979000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.979000 audit[3562]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3550 pid=3562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:19.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430663631326364643063663235356437356362616138383731616636 May 15 10:05:19.979000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.979000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.979000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.979000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.979000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.979000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.979000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.979000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.979000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.979000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.979000 audit: BPF prog-id=156 op=LOAD May 15 10:05:19.979000 audit[3562]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3550 pid=3562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:19.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430663631326364643063663235356437356362616138383731616636 May 15 10:05:19.980000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.980000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.980000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.980000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.980000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.980000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.980000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.980000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.980000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.980000 audit: BPF prog-id=157 op=LOAD May 15 10:05:19.980000 audit[3562]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3550 pid=3562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:19.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430663631326364643063663235356437356362616138383731616636 May 15 10:05:19.982000 audit: BPF prog-id=157 op=UNLOAD May 15 10:05:19.982000 audit: BPF prog-id=156 op=UNLOAD May 15 10:05:19.982000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.982000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.982000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.982000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.982000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.982000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.982000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.982000 audit[3562]: AVC avc: denied { perfmon } for pid=3562 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.982000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.982000 audit[3562]: AVC avc: denied { bpf } for pid=3562 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:19.982000 audit: BPF prog-id=158 op=LOAD May 15 10:05:19.982000 audit[3562]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3550 pid=3562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:19.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430663631326364643063663235356437356362616138383731616636 May 15 10:05:19.988288 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:05:20.005593 env[1216]: time="2025-05-15T10:05:20.005538755Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-2gbhj,Uid:9f5db866-c398-45ad-8a42-5cc212ce1355,Namespace:kube-system,Attempt:1,} returns sandbox id \"40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773\"" May 15 10:05:20.006779 kubelet[1951]: E0515 10:05:20.006577 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:20.008333 env[1216]: time="2025-05-15T10:05:20.008290710Z" level=info msg="CreateContainer within sandbox \"40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:05:20.029137 env[1216]: time="2025-05-15T10:05:20.029077522Z" level=info msg="CreateContainer within sandbox \"40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"fc96d6941b7cace5931d4fe4427239089d4edbbca1b4d9ee3ecf0e0f1a44e136\"" May 15 10:05:20.029781 env[1216]: time="2025-05-15T10:05:20.029752181Z" level=info msg="StartContainer for \"fc96d6941b7cace5931d4fe4427239089d4edbbca1b4d9ee3ecf0e0f1a44e136\"" May 15 10:05:20.044932 systemd[1]: Started cri-containerd-fc96d6941b7cace5931d4fe4427239089d4edbbca1b4d9ee3ecf0e0f1a44e136.scope. May 15 10:05:20.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit: BPF prog-id=159 op=LOAD May 15 10:05:20.069000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3550 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393664363934316237636163653539333164346665343432373233 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3550 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393664363934316237636163653539333164346665343432373233 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit: BPF prog-id=160 op=LOAD May 15 10:05:20.069000 audit[3592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3550 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393664363934316237636163653539333164346665343432373233 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.069000 audit: BPF prog-id=161 op=LOAD May 15 10:05:20.069000 audit[3592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3550 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393664363934316237636163653539333164346665343432373233 May 15 10:05:20.070000 audit: BPF prog-id=161 op=UNLOAD May 15 10:05:20.070000 audit: BPF prog-id=160 op=UNLOAD May 15 10:05:20.070000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.070000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.070000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.070000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.070000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.070000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.070000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.070000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.070000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.070000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.070000 audit: BPF prog-id=162 op=LOAD May 15 10:05:20.070000 audit[3592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3550 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663393664363934316237636163653539333164346665343432373233 May 15 10:05:20.084176 env[1216]: time="2025-05-15T10:05:20.084120516Z" level=info msg="StartContainer for \"fc96d6941b7cace5931d4fe4427239089d4edbbca1b4d9ee3ecf0e0f1a44e136\" returns successfully" May 15 10:05:20.305449 env[1216]: time="2025-05-15T10:05:20.305395121Z" level=info msg="StopPodSandbox for \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\"" May 15 10:05:20.305975 env[1216]: time="2025-05-15T10:05:20.305396041Z" level=info msg="StopPodSandbox for \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\"" May 15 10:05:20.413180 env[1216]: 2025-05-15 10:05:20.363 [INFO][3653] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" May 15 10:05:20.413180 env[1216]: 2025-05-15 10:05:20.364 [INFO][3653] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" iface="eth0" netns="/var/run/netns/cni-088bb95c-411e-9c7b-1648-ec73a9b2b1c0" May 15 10:05:20.413180 env[1216]: 2025-05-15 10:05:20.364 [INFO][3653] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" iface="eth0" netns="/var/run/netns/cni-088bb95c-411e-9c7b-1648-ec73a9b2b1c0" May 15 10:05:20.413180 env[1216]: 2025-05-15 10:05:20.368 [INFO][3653] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" iface="eth0" netns="/var/run/netns/cni-088bb95c-411e-9c7b-1648-ec73a9b2b1c0" May 15 10:05:20.413180 env[1216]: 2025-05-15 10:05:20.368 [INFO][3653] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" May 15 10:05:20.413180 env[1216]: 2025-05-15 10:05:20.368 [INFO][3653] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" May 15 10:05:20.413180 env[1216]: 2025-05-15 10:05:20.397 [INFO][3675] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" HandleID="k8s-pod-network.bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" Workload="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" May 15 10:05:20.413180 env[1216]: 2025-05-15 10:05:20.398 [INFO][3675] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:20.413180 env[1216]: 2025-05-15 10:05:20.398 [INFO][3675] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:20.413180 env[1216]: 2025-05-15 10:05:20.408 [WARNING][3675] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" HandleID="k8s-pod-network.bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" Workload="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" May 15 10:05:20.413180 env[1216]: 2025-05-15 10:05:20.408 [INFO][3675] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" HandleID="k8s-pod-network.bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" Workload="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" May 15 10:05:20.413180 env[1216]: 2025-05-15 10:05:20.409 [INFO][3675] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:20.413180 env[1216]: 2025-05-15 10:05:20.411 [INFO][3653] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" May 15 10:05:20.413750 env[1216]: time="2025-05-15T10:05:20.413334449Z" level=info msg="TearDown network for sandbox \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\" successfully" May 15 10:05:20.413750 env[1216]: time="2025-05-15T10:05:20.413370050Z" level=info msg="StopPodSandbox for \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\" returns successfully" May 15 10:05:20.414086 env[1216]: time="2025-05-15T10:05:20.414053229Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-544995c86d-2cmzm,Uid:b33edbce-e854-4547-85f6-10c1e7fcf595,Namespace:calico-apiserver,Attempt:1,}" May 15 10:05:20.421275 kubelet[1951]: E0515 10:05:20.420764 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:20.443345 env[1216]: 2025-05-15 10:05:20.372 [INFO][3664] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" May 15 10:05:20.443345 env[1216]: 2025-05-15 10:05:20.372 [INFO][3664] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" iface="eth0" netns="/var/run/netns/cni-77281f47-fac3-9592-b0ff-39ba1bcf3ab3" May 15 10:05:20.443345 env[1216]: 2025-05-15 10:05:20.372 [INFO][3664] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" iface="eth0" netns="/var/run/netns/cni-77281f47-fac3-9592-b0ff-39ba1bcf3ab3" May 15 10:05:20.443345 env[1216]: 2025-05-15 10:05:20.372 [INFO][3664] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" iface="eth0" netns="/var/run/netns/cni-77281f47-fac3-9592-b0ff-39ba1bcf3ab3" May 15 10:05:20.443345 env[1216]: 2025-05-15 10:05:20.372 [INFO][3664] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" May 15 10:05:20.443345 env[1216]: 2025-05-15 10:05:20.372 [INFO][3664] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" May 15 10:05:20.443345 env[1216]: 2025-05-15 10:05:20.415 [INFO][3681] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" HandleID="k8s-pod-network.23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" Workload="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" May 15 10:05:20.443345 env[1216]: 2025-05-15 10:05:20.415 [INFO][3681] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:20.443345 env[1216]: 2025-05-15 10:05:20.415 [INFO][3681] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:20.443345 env[1216]: 2025-05-15 10:05:20.429 [WARNING][3681] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" HandleID="k8s-pod-network.23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" Workload="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" May 15 10:05:20.443345 env[1216]: 2025-05-15 10:05:20.429 [INFO][3681] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" HandleID="k8s-pod-network.23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" Workload="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" May 15 10:05:20.443345 env[1216]: 2025-05-15 10:05:20.431 [INFO][3681] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:20.443345 env[1216]: 2025-05-15 10:05:20.434 [INFO][3664] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" May 15 10:05:20.443907 env[1216]: time="2025-05-15T10:05:20.443863769Z" level=info msg="TearDown network for sandbox \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\" successfully" May 15 10:05:20.443963 env[1216]: time="2025-05-15T10:05:20.443932251Z" level=info msg="StopPodSandbox for \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\" returns successfully" May 15 10:05:20.444851 env[1216]: time="2025-05-15T10:05:20.444809555Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-544995c86d-8l9dj,Uid:7f1f243b-eb57-4aa3-b0c4-594c99e3933a,Namespace:calico-apiserver,Attempt:1,}" May 15 10:05:20.453203 kubelet[1951]: I0515 10:05:20.452476 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-2gbhj" podStartSLOduration=30.452459165 podStartE2EDuration="30.452459165s" podCreationTimestamp="2025-05-15 10:04:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:05:20.436292761 +0000 UTC m=+36.223533921" watchObservedRunningTime="2025-05-15 10:05:20.452459165 +0000 UTC m=+36.239700325" May 15 10:05:20.507000 audit[3721]: NETFILTER_CFG table=filter:102 family=2 entries=16 op=nft_register_rule pid=3721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:20.507000 audit[3721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffdd1e6e40 a2=0 a3=1 items=0 ppid=2126 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.507000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:20.513000 audit[3721]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=3721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:20.513000 audit[3721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffdd1e6e40 a2=0 a3=1 items=0 ppid=2126 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.513000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:20.530000 audit[3738]: NETFILTER_CFG table=filter:104 family=2 entries=13 op=nft_register_rule pid=3738 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:20.530000 audit[3738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffc477a250 a2=0 a3=1 items=0 ppid=2126 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.530000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:20.537000 audit[3738]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=3738 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:20.537000 audit[3738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffc477a250 a2=0 a3=1 items=0 ppid=2126 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.537000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:20.602910 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali00bd6f8cae4: link becomes ready May 15 10:05:20.600868 systemd-networkd[1052]: cali00bd6f8cae4: Link UP May 15 10:05:20.603313 systemd-networkd[1052]: cali00bd6f8cae4: Gained carrier May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.503 [INFO][3691] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0 calico-apiserver-544995c86d- calico-apiserver b33edbce-e854-4547-85f6-10c1e7fcf595 824 0 2025-05-15 10:04:56 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:544995c86d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-544995c86d-2cmzm eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali00bd6f8cae4 [] []}} ContainerID="1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" Namespace="calico-apiserver" Pod="calico-apiserver-544995c86d-2cmzm" WorkloadEndpoint="localhost-k8s-calico--apiserver--544995c86d--2cmzm-" May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.503 [INFO][3691] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" Namespace="calico-apiserver" Pod="calico-apiserver-544995c86d-2cmzm" WorkloadEndpoint="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.545 [INFO][3725] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" HandleID="k8s-pod-network.1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" Workload="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.560 [INFO][3725] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" HandleID="k8s-pod-network.1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" Workload="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d8b70), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-544995c86d-2cmzm", "timestamp":"2025-05-15 10:05:20.545104433 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.561 [INFO][3725] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.561 [INFO][3725] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.561 [INFO][3725] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.565 [INFO][3725] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" host="localhost" May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.570 [INFO][3725] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.577 [INFO][3725] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.579 [INFO][3725] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.582 [INFO][3725] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.582 [INFO][3725] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" host="localhost" May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.584 [INFO][3725] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.588 [INFO][3725] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" host="localhost" May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.594 [INFO][3725] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" host="localhost" May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.594 [INFO][3725] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" host="localhost" May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.594 [INFO][3725] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:20.618951 env[1216]: 2025-05-15 10:05:20.594 [INFO][3725] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" HandleID="k8s-pod-network.1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" Workload="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" May 15 10:05:20.619606 env[1216]: 2025-05-15 10:05:20.598 [INFO][3691] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" Namespace="calico-apiserver" Pod="calico-apiserver-544995c86d-2cmzm" WorkloadEndpoint="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0", GenerateName:"calico-apiserver-544995c86d-", Namespace:"calico-apiserver", SelfLink:"", UID:"b33edbce-e854-4547-85f6-10c1e7fcf595", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"544995c86d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-544995c86d-2cmzm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali00bd6f8cae4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:20.619606 env[1216]: 2025-05-15 10:05:20.598 [INFO][3691] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" Namespace="calico-apiserver" Pod="calico-apiserver-544995c86d-2cmzm" WorkloadEndpoint="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" May 15 10:05:20.619606 env[1216]: 2025-05-15 10:05:20.598 [INFO][3691] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali00bd6f8cae4 ContainerID="1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" Namespace="calico-apiserver" Pod="calico-apiserver-544995c86d-2cmzm" WorkloadEndpoint="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" May 15 10:05:20.619606 env[1216]: 2025-05-15 10:05:20.602 [INFO][3691] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" Namespace="calico-apiserver" Pod="calico-apiserver-544995c86d-2cmzm" WorkloadEndpoint="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" May 15 10:05:20.619606 env[1216]: 2025-05-15 10:05:20.602 [INFO][3691] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" Namespace="calico-apiserver" Pod="calico-apiserver-544995c86d-2cmzm" WorkloadEndpoint="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0", GenerateName:"calico-apiserver-544995c86d-", Namespace:"calico-apiserver", SelfLink:"", UID:"b33edbce-e854-4547-85f6-10c1e7fcf595", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"544995c86d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a", Pod:"calico-apiserver-544995c86d-2cmzm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali00bd6f8cae4", MAC:"72:c9:18:09:8b:2d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:20.619606 env[1216]: 2025-05-15 10:05:20.616 [INFO][3691] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a" Namespace="calico-apiserver" Pod="calico-apiserver-544995c86d-2cmzm" WorkloadEndpoint="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" May 15 10:05:20.626000 audit[3756]: NETFILTER_CFG table=filter:106 family=2 entries=44 op=nft_register_chain pid=3756 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:05:20.626000 audit[3756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24680 a0=3 a1=ffffd7327c60 a2=0 a3=ffff80a56fa8 items=0 ppid=3213 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.626000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:05:20.632327 env[1216]: time="2025-05-15T10:05:20.632219109Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:05:20.632327 env[1216]: time="2025-05-15T10:05:20.632299351Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:05:20.632540 env[1216]: time="2025-05-15T10:05:20.632317031Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:05:20.632874 env[1216]: time="2025-05-15T10:05:20.632815965Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a pid=3764 runtime=io.containerd.runc.v2 May 15 10:05:20.640992 systemd[1]: run-containerd-runc-k8s.io-40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773-runc.KK6XxP.mount: Deactivated successfully. May 15 10:05:20.641090 systemd[1]: run-netns-cni\x2d77281f47\x2dfac3\x2d9592\x2db0ff\x2d39ba1bcf3ab3.mount: Deactivated successfully. May 15 10:05:20.641141 systemd[1]: run-netns-cni\x2d088bb95c\x2d411e\x2d9c7b\x2d1648\x2dec73a9b2b1c0.mount: Deactivated successfully. May 15 10:05:20.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.18:22-10.0.0.1:46884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:20.647190 systemd[1]: Started sshd@8-10.0.0.18:22-10.0.0.1:46884.service. May 15 10:05:20.659493 systemd[1]: run-containerd-runc-k8s.io-1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a-runc.eQL756.mount: Deactivated successfully. May 15 10:05:20.662278 systemd[1]: Started cri-containerd-1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a.scope. May 15 10:05:20.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.694000 audit: BPF prog-id=163 op=LOAD May 15 10:05:20.695000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3764 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161373337366566613337393761396566316131333235373134326631 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3764 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161373337366566613337393761396566316131333235373134326631 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit: BPF prog-id=164 op=LOAD May 15 10:05:20.695000 audit[3774]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3764 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161373337366566613337393761396566316131333235373134326631 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.695000 audit: BPF prog-id=165 op=LOAD May 15 10:05:20.695000 audit[3774]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3764 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161373337366566613337393761396566316131333235373134326631 May 15 10:05:20.696000 audit: BPF prog-id=165 op=UNLOAD May 15 10:05:20.696000 audit: BPF prog-id=164 op=UNLOAD May 15 10:05:20.696000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.696000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.696000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.696000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.696000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.696000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.696000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.696000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.696000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.696000 audit[3781]: USER_ACCT pid=3781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:20.696000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.696000 audit: BPF prog-id=166 op=LOAD May 15 10:05:20.696000 audit[3774]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3764 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161373337366566613337393761396566316131333235373134326631 May 15 10:05:20.698498 sshd[3781]: Accepted publickey for core from 10.0.0.1 port 46884 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:05:20.698000 audit[3781]: CRED_ACQ pid=3781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:20.698000 audit[3781]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed140300 a2=3 a3=1 items=0 ppid=1 pid=3781 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.698000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:05:20.701030 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:05:20.701104 sshd[3781]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:05:20.705204 systemd-logind[1208]: New session 9 of user core. May 15 10:05:20.706371 systemd[1]: Started session-9.scope. May 15 10:05:20.711921 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calieee0facc94b: link becomes ready May 15 10:05:20.709431 systemd-networkd[1052]: calieee0facc94b: Link UP May 15 10:05:20.709607 systemd-networkd[1052]: calieee0facc94b: Gained carrier May 15 10:05:20.722000 audit[3781]: USER_START pid=3781 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:20.723000 audit[3797]: CRED_ACQ pid=3797 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.518 [INFO][3703] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0 calico-apiserver-544995c86d- calico-apiserver 7f1f243b-eb57-4aa3-b0c4-594c99e3933a 825 0 2025-05-15 10:04:56 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:544995c86d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-544995c86d-8l9dj eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calieee0facc94b [] []}} ContainerID="c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" Namespace="calico-apiserver" Pod="calico-apiserver-544995c86d-8l9dj" WorkloadEndpoint="localhost-k8s-calico--apiserver--544995c86d--8l9dj-" May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.518 [INFO][3703] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" Namespace="calico-apiserver" Pod="calico-apiserver-544995c86d-8l9dj" WorkloadEndpoint="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.559 [INFO][3732] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" HandleID="k8s-pod-network.c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" Workload="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.572 [INFO][3732] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" HandleID="k8s-pod-network.c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" Workload="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000373830), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-544995c86d-8l9dj", "timestamp":"2025-05-15 10:05:20.559761036 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.572 [INFO][3732] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.594 [INFO][3732] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.594 [INFO][3732] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.665 [INFO][3732] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" host="localhost" May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.673 [INFO][3732] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.678 [INFO][3732] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.680 [INFO][3732] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.683 [INFO][3732] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.683 [INFO][3732] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" host="localhost" May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.685 [INFO][3732] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155 May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.689 [INFO][3732] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" host="localhost" May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.695 [INFO][3732] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" host="localhost" May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.695 [INFO][3732] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" host="localhost" May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.695 [INFO][3732] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:20.725541 env[1216]: 2025-05-15 10:05:20.695 [INFO][3732] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" HandleID="k8s-pod-network.c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" Workload="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" May 15 10:05:20.726049 env[1216]: 2025-05-15 10:05:20.703 [INFO][3703] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" Namespace="calico-apiserver" Pod="calico-apiserver-544995c86d-8l9dj" WorkloadEndpoint="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0", GenerateName:"calico-apiserver-544995c86d-", Namespace:"calico-apiserver", SelfLink:"", UID:"7f1f243b-eb57-4aa3-b0c4-594c99e3933a", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"544995c86d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-544995c86d-8l9dj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calieee0facc94b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:20.726049 env[1216]: 2025-05-15 10:05:20.704 [INFO][3703] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" Namespace="calico-apiserver" Pod="calico-apiserver-544995c86d-8l9dj" WorkloadEndpoint="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" May 15 10:05:20.726049 env[1216]: 2025-05-15 10:05:20.704 [INFO][3703] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calieee0facc94b ContainerID="c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" Namespace="calico-apiserver" Pod="calico-apiserver-544995c86d-8l9dj" WorkloadEndpoint="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" May 15 10:05:20.726049 env[1216]: 2025-05-15 10:05:20.708 [INFO][3703] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" Namespace="calico-apiserver" Pod="calico-apiserver-544995c86d-8l9dj" WorkloadEndpoint="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" May 15 10:05:20.726049 env[1216]: 2025-05-15 10:05:20.708 [INFO][3703] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" Namespace="calico-apiserver" Pod="calico-apiserver-544995c86d-8l9dj" WorkloadEndpoint="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0", GenerateName:"calico-apiserver-544995c86d-", Namespace:"calico-apiserver", SelfLink:"", UID:"7f1f243b-eb57-4aa3-b0c4-594c99e3933a", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"544995c86d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155", Pod:"calico-apiserver-544995c86d-8l9dj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calieee0facc94b", MAC:"fa:51:7d:04:a1:d4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:20.726049 env[1216]: 2025-05-15 10:05:20.717 [INFO][3703] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155" Namespace="calico-apiserver" Pod="calico-apiserver-544995c86d-8l9dj" WorkloadEndpoint="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" May 15 10:05:20.727000 audit[3808]: NETFILTER_CFG table=filter:107 family=2 entries=44 op=nft_register_chain pid=3808 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:05:20.727000 audit[3808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24368 a0=3 a1=ffffc5ee1270 a2=0 a3=ffff84067fa8 items=0 ppid=3213 pid=3808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.727000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:05:20.731121 env[1216]: time="2025-05-15T10:05:20.731077867Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-544995c86d-2cmzm,Uid:b33edbce-e854-4547-85f6-10c1e7fcf595,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a\"" May 15 10:05:20.732811 env[1216]: time="2025-05-15T10:05:20.732779514Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:05:20.737691 env[1216]: time="2025-05-15T10:05:20.737626727Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:05:20.737691 env[1216]: time="2025-05-15T10:05:20.737666448Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:05:20.737691 env[1216]: time="2025-05-15T10:05:20.737677129Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:05:20.737951 env[1216]: time="2025-05-15T10:05:20.737911455Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155 pid=3821 runtime=io.containerd.runc.v2 May 15 10:05:20.751888 systemd[1]: Started cri-containerd-c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155.scope. May 15 10:05:20.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.771000 audit: BPF prog-id=167 op=LOAD May 15 10:05:20.772000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.772000 audit[3831]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3821 pid=3831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353138323135353365346630313239363834393065303533383165 May 15 10:05:20.772000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.772000 audit[3831]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3821 pid=3831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353138323135353365346630313239363834393065303533383165 May 15 10:05:20.772000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.772000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.772000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.772000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.772000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.772000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.772000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.772000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.772000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.772000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.772000 audit: BPF prog-id=168 op=LOAD May 15 10:05:20.772000 audit[3831]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3821 pid=3831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353138323135353365346630313239363834393065303533383165 May 15 10:05:20.773000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.773000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.773000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.773000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.773000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.773000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.773000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.773000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.773000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.773000 audit: BPF prog-id=169 op=LOAD May 15 10:05:20.773000 audit[3831]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3821 pid=3831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353138323135353365346630313239363834393065303533383165 May 15 10:05:20.773000 audit: BPF prog-id=169 op=UNLOAD May 15 10:05:20.774000 audit: BPF prog-id=168 op=UNLOAD May 15 10:05:20.774000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.774000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.774000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.774000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.774000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.774000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.774000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.774000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.774000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.774000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:20.774000 audit: BPF prog-id=170 op=LOAD May 15 10:05:20.774000 audit[3831]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3821 pid=3831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:20.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353138323135353365346630313239363834393065303533383165 May 15 10:05:20.776574 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:05:20.795379 env[1216]: time="2025-05-15T10:05:20.795325194Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-544995c86d-8l9dj,Uid:7f1f243b-eb57-4aa3-b0c4-594c99e3933a,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155\"" May 15 10:05:20.886302 sshd[3781]: pam_unix(sshd:session): session closed for user core May 15 10:05:20.885000 audit[3781]: USER_END pid=3781 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:20.886000 audit[3781]: CRED_DISP pid=3781 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:20.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.18:22-10.0.0.1:46884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:20.889965 systemd[1]: sshd@8-10.0.0.18:22-10.0.0.1:46884.service: Deactivated successfully. May 15 10:05:20.890776 systemd[1]: session-9.scope: Deactivated successfully. May 15 10:05:20.891337 systemd-logind[1208]: Session 9 logged out. Waiting for processes to exit. May 15 10:05:20.892022 systemd-logind[1208]: Removed session 9. May 15 10:05:21.236478 systemd-networkd[1052]: cali003d6e4caf8: Gained IPv6LL May 15 10:05:21.305004 env[1216]: time="2025-05-15T10:05:21.304959670Z" level=info msg="StopPodSandbox for \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\"" May 15 10:05:21.305160 env[1216]: time="2025-05-15T10:05:21.305077993Z" level=info msg="StopPodSandbox for \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\"" May 15 10:05:21.402447 env[1216]: 2025-05-15 10:05:21.361 [INFO][3895] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" May 15 10:05:21.402447 env[1216]: 2025-05-15 10:05:21.361 [INFO][3895] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" iface="eth0" netns="/var/run/netns/cni-8f2d27d7-0c29-4a0a-350b-239e86e51eb1" May 15 10:05:21.402447 env[1216]: 2025-05-15 10:05:21.362 [INFO][3895] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" iface="eth0" netns="/var/run/netns/cni-8f2d27d7-0c29-4a0a-350b-239e86e51eb1" May 15 10:05:21.402447 env[1216]: 2025-05-15 10:05:21.362 [INFO][3895] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" iface="eth0" netns="/var/run/netns/cni-8f2d27d7-0c29-4a0a-350b-239e86e51eb1" May 15 10:05:21.402447 env[1216]: 2025-05-15 10:05:21.362 [INFO][3895] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" May 15 10:05:21.402447 env[1216]: 2025-05-15 10:05:21.362 [INFO][3895] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" May 15 10:05:21.402447 env[1216]: 2025-05-15 10:05:21.384 [INFO][3912] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" HandleID="k8s-pod-network.d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" Workload="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" May 15 10:05:21.402447 env[1216]: 2025-05-15 10:05:21.384 [INFO][3912] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:21.402447 env[1216]: 2025-05-15 10:05:21.384 [INFO][3912] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:21.402447 env[1216]: 2025-05-15 10:05:21.393 [WARNING][3912] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" HandleID="k8s-pod-network.d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" Workload="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" May 15 10:05:21.402447 env[1216]: 2025-05-15 10:05:21.393 [INFO][3912] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" HandleID="k8s-pod-network.d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" Workload="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" May 15 10:05:21.402447 env[1216]: 2025-05-15 10:05:21.396 [INFO][3912] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:21.402447 env[1216]: 2025-05-15 10:05:21.398 [INFO][3895] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" May 15 10:05:21.403063 env[1216]: time="2025-05-15T10:05:21.402585604Z" level=info msg="TearDown network for sandbox \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\" successfully" May 15 10:05:21.403063 env[1216]: time="2025-05-15T10:05:21.402619285Z" level=info msg="StopPodSandbox for \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\" returns successfully" May 15 10:05:21.403120 kubelet[1951]: E0515 10:05:21.402945 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:21.403622 env[1216]: time="2025-05-15T10:05:21.403588711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-5pxzd,Uid:5ca3009b-464d-4ecc-b330-d9060256ea98,Namespace:kube-system,Attempt:1,}" May 15 10:05:21.415523 env[1216]: 2025-05-15 10:05:21.371 [INFO][3896] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" May 15 10:05:21.415523 env[1216]: 2025-05-15 10:05:21.371 [INFO][3896] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" iface="eth0" netns="/var/run/netns/cni-21c68d07-67d9-cf31-1a0c-8ac61b824680" May 15 10:05:21.415523 env[1216]: 2025-05-15 10:05:21.371 [INFO][3896] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" iface="eth0" netns="/var/run/netns/cni-21c68d07-67d9-cf31-1a0c-8ac61b824680" May 15 10:05:21.415523 env[1216]: 2025-05-15 10:05:21.371 [INFO][3896] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" iface="eth0" netns="/var/run/netns/cni-21c68d07-67d9-cf31-1a0c-8ac61b824680" May 15 10:05:21.415523 env[1216]: 2025-05-15 10:05:21.371 [INFO][3896] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" May 15 10:05:21.415523 env[1216]: 2025-05-15 10:05:21.372 [INFO][3896] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" May 15 10:05:21.415523 env[1216]: 2025-05-15 10:05:21.397 [INFO][3919] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" HandleID="k8s-pod-network.0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" Workload="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" May 15 10:05:21.415523 env[1216]: 2025-05-15 10:05:21.398 [INFO][3919] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:21.415523 env[1216]: 2025-05-15 10:05:21.398 [INFO][3919] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:21.415523 env[1216]: 2025-05-15 10:05:21.409 [WARNING][3919] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" HandleID="k8s-pod-network.0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" Workload="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" May 15 10:05:21.415523 env[1216]: 2025-05-15 10:05:21.409 [INFO][3919] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" HandleID="k8s-pod-network.0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" Workload="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" May 15 10:05:21.415523 env[1216]: 2025-05-15 10:05:21.411 [INFO][3919] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:21.415523 env[1216]: 2025-05-15 10:05:21.413 [INFO][3896] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" May 15 10:05:21.416099 env[1216]: time="2025-05-15T10:05:21.415698355Z" level=info msg="TearDown network for sandbox \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\" successfully" May 15 10:05:21.416099 env[1216]: time="2025-05-15T10:05:21.415732756Z" level=info msg="StopPodSandbox for \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\" returns successfully" May 15 10:05:21.416532 env[1216]: time="2025-05-15T10:05:21.416500136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85df6c8f48-khsxw,Uid:cfbf95ca-356d-4e86-9b10-1c746b5559fe,Namespace:calico-system,Attempt:1,}" May 15 10:05:21.426049 kubelet[1951]: E0515 10:05:21.426008 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:21.541399 systemd-networkd[1052]: cali0527a3f4b02: Link UP May 15 10:05:21.543113 systemd-networkd[1052]: cali0527a3f4b02: Gained carrier May 15 10:05:21.543335 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:05:21.543367 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0527a3f4b02: link becomes ready May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.456 [INFO][3933] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0 coredns-6f6b679f8f- kube-system 5ca3009b-464d-4ecc-b330-d9060256ea98 853 0 2025-05-15 10:04:50 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-5pxzd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali0527a3f4b02 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" Namespace="kube-system" Pod="coredns-6f6b679f8f-5pxzd" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--5pxzd-" May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.456 [INFO][3933] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" Namespace="kube-system" Pod="coredns-6f6b679f8f-5pxzd" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.492 [INFO][3961] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" HandleID="k8s-pod-network.36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" Workload="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.503 [INFO][3961] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" HandleID="k8s-pod-network.36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" Workload="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002780e0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-5pxzd", "timestamp":"2025-05-15 10:05:21.492422689 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.503 [INFO][3961] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.503 [INFO][3961] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.503 [INFO][3961] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.506 [INFO][3961] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" host="localhost" May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.511 [INFO][3961] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.516 [INFO][3961] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.519 [INFO][3961] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.521 [INFO][3961] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.521 [INFO][3961] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" host="localhost" May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.523 [INFO][3961] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42 May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.528 [INFO][3961] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" host="localhost" May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.535 [INFO][3961] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" host="localhost" May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.535 [INFO][3961] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" host="localhost" May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.535 [INFO][3961] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:21.555351 env[1216]: 2025-05-15 10:05:21.535 [INFO][3961] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" HandleID="k8s-pod-network.36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" Workload="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" May 15 10:05:21.555955 env[1216]: 2025-05-15 10:05:21.538 [INFO][3933] cni-plugin/k8s.go 386: Populated endpoint ContainerID="36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" Namespace="kube-system" Pod="coredns-6f6b679f8f-5pxzd" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"5ca3009b-464d-4ecc-b330-d9060256ea98", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-5pxzd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0527a3f4b02", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:21.555955 env[1216]: 2025-05-15 10:05:21.538 [INFO][3933] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" Namespace="kube-system" Pod="coredns-6f6b679f8f-5pxzd" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" May 15 10:05:21.555955 env[1216]: 2025-05-15 10:05:21.538 [INFO][3933] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0527a3f4b02 ContainerID="36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" Namespace="kube-system" Pod="coredns-6f6b679f8f-5pxzd" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" May 15 10:05:21.555955 env[1216]: 2025-05-15 10:05:21.543 [INFO][3933] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" Namespace="kube-system" Pod="coredns-6f6b679f8f-5pxzd" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" May 15 10:05:21.555955 env[1216]: 2025-05-15 10:05:21.543 [INFO][3933] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" Namespace="kube-system" Pod="coredns-6f6b679f8f-5pxzd" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"5ca3009b-464d-4ecc-b330-d9060256ea98", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42", Pod:"coredns-6f6b679f8f-5pxzd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0527a3f4b02", MAC:"4e:03:5c:a5:3c:0a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:21.555955 env[1216]: 2025-05-15 10:05:21.553 [INFO][3933] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42" Namespace="kube-system" Pod="coredns-6f6b679f8f-5pxzd" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" May 15 10:05:21.563000 audit[3995]: NETFILTER_CFG table=filter:108 family=2 entries=34 op=nft_register_chain pid=3995 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:05:21.563000 audit[3995]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18240 a0=3 a1=fffffe8f33d0 a2=0 a3=ffffa115afa8 items=0 ppid=3213 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:21.563000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:05:21.574578 env[1216]: time="2025-05-15T10:05:21.574470405Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:05:21.574578 env[1216]: time="2025-05-15T10:05:21.574519487Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:05:21.574578 env[1216]: time="2025-05-15T10:05:21.574531007Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:05:21.574769 env[1216]: time="2025-05-15T10:05:21.574693691Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42 pid=4004 runtime=io.containerd.runc.v2 May 15 10:05:21.585927 systemd[1]: Started cri-containerd-36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42.scope. May 15 10:05:21.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.613000 audit: BPF prog-id=171 op=LOAD May 15 10:05:21.613000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.613000 audit[4015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400019db38 a2=10 a3=0 items=0 ppid=4004 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:21.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336663564626464656666666435363262646632656665626264306132 May 15 10:05:21.613000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.613000 audit[4015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=4004 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:21.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336663564626464656666666435363262646632656665626264306132 May 15 10:05:21.613000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.613000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.613000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.613000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.613000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.613000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.613000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.613000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.613000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.613000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.613000 audit: BPF prog-id=172 op=LOAD May 15 10:05:21.613000 audit[4015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=4004 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:21.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336663564626464656666666435363262646632656665626264306132 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit: BPF prog-id=173 op=LOAD May 15 10:05:21.614000 audit[4015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=4004 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:21.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336663564626464656666666435363262646632656665626264306132 May 15 10:05:21.614000 audit: BPF prog-id=173 op=UNLOAD May 15 10:05:21.614000 audit: BPF prog-id=172 op=UNLOAD May 15 10:05:21.614000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.614000 audit: BPF prog-id=174 op=LOAD May 15 10:05:21.614000 audit[4015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=4004 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:21.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336663564626464656666666435363262646632656665626264306132 May 15 10:05:21.616950 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:05:21.640505 systemd[1]: run-netns-cni\x2d8f2d27d7\x2d0c29\x2d4a0a\x2d350b\x2d239e86e51eb1.mount: Deactivated successfully. May 15 10:05:21.640600 systemd[1]: run-netns-cni\x2d21c68d07\x2d67d9\x2dcf31\x2d1a0c\x2d8ac61b824680.mount: Deactivated successfully. May 15 10:05:21.650061 env[1216]: time="2025-05-15T10:05:21.650005468Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-5pxzd,Uid:5ca3009b-464d-4ecc-b330-d9060256ea98,Namespace:kube-system,Attempt:1,} returns sandbox id \"36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42\"" May 15 10:05:21.650807 kubelet[1951]: E0515 10:05:21.650774 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:21.656946 env[1216]: time="2025-05-15T10:05:21.656888452Z" level=info msg="CreateContainer within sandbox \"36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:05:21.660064 systemd-networkd[1052]: cali43129fcc65c: Link UP May 15 10:05:21.661019 systemd-networkd[1052]: cali43129fcc65c: Gained carrier May 15 10:05:21.661542 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali43129fcc65c: link becomes ready May 15 10:05:21.675176 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount655560724.mount: Deactivated successfully. May 15 10:05:21.682364 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount287189462.mount: Deactivated successfully. May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.473 [INFO][3945] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0 calico-kube-controllers-85df6c8f48- calico-system cfbf95ca-356d-4e86-9b10-1c746b5559fe 854 0 2025-05-15 10:04:58 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:85df6c8f48 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-85df6c8f48-khsxw eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali43129fcc65c [] []}} ContainerID="89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" Namespace="calico-system" Pod="calico-kube-controllers-85df6c8f48-khsxw" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-" May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.474 [INFO][3945] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" Namespace="calico-system" Pod="calico-kube-controllers-85df6c8f48-khsxw" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.506 [INFO][3970] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" HandleID="k8s-pod-network.89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" Workload="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.520 [INFO][3970] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" HandleID="k8s-pod-network.89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" Workload="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400027b9b0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-85df6c8f48-khsxw", "timestamp":"2025-05-15 10:05:21.506583588 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.520 [INFO][3970] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.535 [INFO][3970] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.535 [INFO][3970] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.610 [INFO][3970] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" host="localhost" May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.616 [INFO][3970] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.621 [INFO][3970] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.623 [INFO][3970] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.627 [INFO][3970] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.627 [INFO][3970] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" host="localhost" May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.629 [INFO][3970] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0 May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.634 [INFO][3970] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" host="localhost" May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.647 [INFO][3970] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" host="localhost" May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.647 [INFO][3970] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" host="localhost" May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.647 [INFO][3970] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:21.685890 env[1216]: 2025-05-15 10:05:21.647 [INFO][3970] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" HandleID="k8s-pod-network.89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" Workload="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" May 15 10:05:21.686501 env[1216]: 2025-05-15 10:05:21.650 [INFO][3945] cni-plugin/k8s.go 386: Populated endpoint ContainerID="89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" Namespace="calico-system" Pod="calico-kube-controllers-85df6c8f48-khsxw" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0", GenerateName:"calico-kube-controllers-85df6c8f48-", Namespace:"calico-system", SelfLink:"", UID:"cfbf95ca-356d-4e86-9b10-1c746b5559fe", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85df6c8f48", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-85df6c8f48-khsxw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali43129fcc65c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:21.686501 env[1216]: 2025-05-15 10:05:21.650 [INFO][3945] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" Namespace="calico-system" Pod="calico-kube-controllers-85df6c8f48-khsxw" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" May 15 10:05:21.686501 env[1216]: 2025-05-15 10:05:21.650 [INFO][3945] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali43129fcc65c ContainerID="89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" Namespace="calico-system" Pod="calico-kube-controllers-85df6c8f48-khsxw" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" May 15 10:05:21.686501 env[1216]: 2025-05-15 10:05:21.661 [INFO][3945] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" Namespace="calico-system" Pod="calico-kube-controllers-85df6c8f48-khsxw" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" May 15 10:05:21.686501 env[1216]: 2025-05-15 10:05:21.661 [INFO][3945] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" Namespace="calico-system" Pod="calico-kube-controllers-85df6c8f48-khsxw" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0", GenerateName:"calico-kube-controllers-85df6c8f48-", Namespace:"calico-system", SelfLink:"", UID:"cfbf95ca-356d-4e86-9b10-1c746b5559fe", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85df6c8f48", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0", Pod:"calico-kube-controllers-85df6c8f48-khsxw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali43129fcc65c", MAC:"9e:ce:4e:fa:7a:e8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:21.686501 env[1216]: 2025-05-15 10:05:21.682 [INFO][3945] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0" Namespace="calico-system" Pod="calico-kube-controllers-85df6c8f48-khsxw" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" May 15 10:05:21.689000 audit[4049]: NETFILTER_CFG table=filter:109 family=2 entries=42 op=nft_register_chain pid=4049 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:05:21.689000 audit[4049]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21508 a0=3 a1=ffffe2664a90 a2=0 a3=ffffbbd0cfa8 items=0 ppid=3213 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:21.689000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:05:21.694142 env[1216]: time="2025-05-15T10:05:21.694072408Z" level=info msg="CreateContainer within sandbox \"36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"75723f6b342733167ab9b2ef82d3f61a0d43e82502cd9cdb2f049bd35b28891e\"" May 15 10:05:21.695111 env[1216]: time="2025-05-15T10:05:21.695081155Z" level=info msg="StartContainer for \"75723f6b342733167ab9b2ef82d3f61a0d43e82502cd9cdb2f049bd35b28891e\"" May 15 10:05:21.703010 env[1216]: time="2025-05-15T10:05:21.702934845Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:05:21.703174 env[1216]: time="2025-05-15T10:05:21.702979766Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:05:21.703174 env[1216]: time="2025-05-15T10:05:21.702998847Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:05:21.703282 env[1216]: time="2025-05-15T10:05:21.703211372Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0 pid=4072 runtime=io.containerd.runc.v2 May 15 10:05:21.712593 systemd[1]: Started cri-containerd-75723f6b342733167ab9b2ef82d3f61a0d43e82502cd9cdb2f049bd35b28891e.scope. May 15 10:05:21.720896 systemd[1]: Started cri-containerd-89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0.scope. May 15 10:05:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit: BPF prog-id=175 op=LOAD May 15 10:05:21.732000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[4077]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4004 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:21.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373233663662333432373333313637616239623265663832643366 May 15 10:05:21.732000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[4077]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4004 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:21.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373233663662333432373333313637616239623265663832643366 May 15 10:05:21.732000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.732000 audit: BPF prog-id=176 op=LOAD May 15 10:05:21.732000 audit[4077]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4004 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:21.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373233663662333432373333313637616239623265663832643366 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit: BPF prog-id=177 op=LOAD May 15 10:05:21.733000 audit[4077]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4004 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:21.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373233663662333432373333313637616239623265663832643366 May 15 10:05:21.733000 audit: BPF prog-id=177 op=UNLOAD May 15 10:05:21.733000 audit: BPF prog-id=176 op=UNLOAD May 15 10:05:21.733000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.733000 audit: BPF prog-id=178 op=LOAD May 15 10:05:21.733000 audit[4077]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4004 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:21.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373233663662333432373333313637616239623265663832643366 May 15 10:05:21.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.740000 audit: BPF prog-id=179 op=LOAD May 15 10:05:21.741000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4072 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:21.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333737633236333765363261663362393062343866353133346537 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4072 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:21.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333737633236333765363261663362393062343866353133346537 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit: BPF prog-id=180 op=LOAD May 15 10:05:21.741000 audit[4087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4072 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:21.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333737633236333765363261663362393062343866353133346537 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit: BPF prog-id=181 op=LOAD May 15 10:05:21.741000 audit[4087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4072 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:21.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333737633236333765363261663362393062343866353133346537 May 15 10:05:21.741000 audit: BPF prog-id=181 op=UNLOAD May 15 10:05:21.741000 audit: BPF prog-id=180 op=UNLOAD May 15 10:05:21.741000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:21.741000 audit: BPF prog-id=182 op=LOAD May 15 10:05:21.741000 audit[4087]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4072 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:21.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333737633236333765363261663362393062343866353133346537 May 15 10:05:21.744230 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:05:21.768107 env[1216]: time="2025-05-15T10:05:21.768055868Z" level=info msg="StartContainer for \"75723f6b342733167ab9b2ef82d3f61a0d43e82502cd9cdb2f049bd35b28891e\" returns successfully" May 15 10:05:21.777307 env[1216]: time="2025-05-15T10:05:21.777232074Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85df6c8f48-khsxw,Uid:cfbf95ca-356d-4e86-9b10-1c746b5559fe,Namespace:calico-system,Attempt:1,} returns sandbox id \"89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0\"" May 15 10:05:22.132371 systemd-networkd[1052]: calieee0facc94b: Gained IPv6LL May 15 10:05:22.260438 systemd-networkd[1052]: cali00bd6f8cae4: Gained IPv6LL May 15 10:05:22.306104 env[1216]: time="2025-05-15T10:05:22.305895500Z" level=info msg="StopPodSandbox for \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\"" May 15 10:05:22.429685 kubelet[1951]: E0515 10:05:22.429569 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:22.430555 kubelet[1951]: E0515 10:05:22.430508 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:22.462664 env[1216]: 2025-05-15 10:05:22.367 [INFO][4151] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" May 15 10:05:22.462664 env[1216]: 2025-05-15 10:05:22.368 [INFO][4151] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" iface="eth0" netns="/var/run/netns/cni-4b86559d-ac0f-e97b-8c60-b5f1f54e154e" May 15 10:05:22.462664 env[1216]: 2025-05-15 10:05:22.368 [INFO][4151] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" iface="eth0" netns="/var/run/netns/cni-4b86559d-ac0f-e97b-8c60-b5f1f54e154e" May 15 10:05:22.462664 env[1216]: 2025-05-15 10:05:22.371 [INFO][4151] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" iface="eth0" netns="/var/run/netns/cni-4b86559d-ac0f-e97b-8c60-b5f1f54e154e" May 15 10:05:22.462664 env[1216]: 2025-05-15 10:05:22.371 [INFO][4151] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" May 15 10:05:22.462664 env[1216]: 2025-05-15 10:05:22.371 [INFO][4151] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" May 15 10:05:22.462664 env[1216]: 2025-05-15 10:05:22.437 [INFO][4160] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" HandleID="k8s-pod-network.24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" Workload="localhost-k8s-csi--node--driver--8v6wf-eth0" May 15 10:05:22.462664 env[1216]: 2025-05-15 10:05:22.437 [INFO][4160] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:22.462664 env[1216]: 2025-05-15 10:05:22.437 [INFO][4160] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:22.462664 env[1216]: 2025-05-15 10:05:22.449 [WARNING][4160] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" HandleID="k8s-pod-network.24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" Workload="localhost-k8s-csi--node--driver--8v6wf-eth0" May 15 10:05:22.462664 env[1216]: 2025-05-15 10:05:22.450 [INFO][4160] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" HandleID="k8s-pod-network.24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" Workload="localhost-k8s-csi--node--driver--8v6wf-eth0" May 15 10:05:22.462664 env[1216]: 2025-05-15 10:05:22.458 [INFO][4160] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:22.462664 env[1216]: 2025-05-15 10:05:22.461 [INFO][4151] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" May 15 10:05:22.463358 env[1216]: time="2025-05-15T10:05:22.462795793Z" level=info msg="TearDown network for sandbox \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\" successfully" May 15 10:05:22.463358 env[1216]: time="2025-05-15T10:05:22.462833994Z" level=info msg="StopPodSandbox for \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\" returns successfully" May 15 10:05:22.464080 env[1216]: time="2025-05-15T10:05:22.464033386Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8v6wf,Uid:b24f406a-f736-4264-9766-c83335e6676c,Namespace:calico-system,Attempt:1,}" May 15 10:05:22.467074 kubelet[1951]: I0515 10:05:22.466995 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-5pxzd" podStartSLOduration=32.466965542 podStartE2EDuration="32.466965542s" podCreationTimestamp="2025-05-15 10:04:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:05:22.44733583 +0000 UTC m=+38.234576990" watchObservedRunningTime="2025-05-15 10:05:22.466965542 +0000 UTC m=+38.254206702" May 15 10:05:22.465000 audit[4169]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=4169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:22.465000 audit[4169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffceabe240 a2=0 a3=1 items=0 ppid=2126 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:22.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:22.471000 audit[4169]: NETFILTER_CFG table=nat:111 family=2 entries=44 op=nft_register_rule pid=4169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:22.471000 audit[4169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffceabe240 a2=0 a3=1 items=0 ppid=2126 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:22.471000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:22.495000 audit[4171]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=4171 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:22.495000 audit[4171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffe7aee710 a2=0 a3=1 items=0 ppid=2126 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:22.495000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:22.512000 audit[4171]: NETFILTER_CFG table=nat:113 family=2 entries=56 op=nft_register_chain pid=4171 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:22.512000 audit[4171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffe7aee710 a2=0 a3=1 items=0 ppid=2126 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:22.512000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:22.640465 systemd[1]: run-netns-cni\x2d4b86559d\x2dac0f\x2de97b\x2d8c60\x2db5f1f54e154e.mount: Deactivated successfully. May 15 10:05:22.647754 systemd-networkd[1052]: cali3f6e261f7d1: Link UP May 15 10:05:22.649740 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:05:22.649840 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3f6e261f7d1: link becomes ready May 15 10:05:22.649746 systemd-networkd[1052]: cali3f6e261f7d1: Gained carrier May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.559 [INFO][4176] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--8v6wf-eth0 csi-node-driver- calico-system b24f406a-f736-4264-9766-c83335e6676c 872 0 2025-05-15 10:04:57 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-8v6wf eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali3f6e261f7d1 [] []}} ContainerID="76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" Namespace="calico-system" Pod="csi-node-driver-8v6wf" WorkloadEndpoint="localhost-k8s-csi--node--driver--8v6wf-" May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.559 [INFO][4176] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" Namespace="calico-system" Pod="csi-node-driver-8v6wf" WorkloadEndpoint="localhost-k8s-csi--node--driver--8v6wf-eth0" May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.592 [INFO][4191] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" HandleID="k8s-pod-network.76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" Workload="localhost-k8s-csi--node--driver--8v6wf-eth0" May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.604 [INFO][4191] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" HandleID="k8s-pod-network.76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" Workload="localhost-k8s-csi--node--driver--8v6wf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400019def0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-8v6wf", "timestamp":"2025-05-15 10:05:22.59260786 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.604 [INFO][4191] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.604 [INFO][4191] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.604 [INFO][4191] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.607 [INFO][4191] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" host="localhost" May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.611 [INFO][4191] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.619 [INFO][4191] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.622 [INFO][4191] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.624 [INFO][4191] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.624 [INFO][4191] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" host="localhost" May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.629 [INFO][4191] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2 May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.634 [INFO][4191] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" host="localhost" May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.642 [INFO][4191] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" host="localhost" May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.643 [INFO][4191] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" host="localhost" May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.643 [INFO][4191] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:22.673639 env[1216]: 2025-05-15 10:05:22.643 [INFO][4191] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" HandleID="k8s-pod-network.76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" Workload="localhost-k8s-csi--node--driver--8v6wf-eth0" May 15 10:05:22.674247 env[1216]: 2025-05-15 10:05:22.645 [INFO][4176] cni-plugin/k8s.go 386: Populated endpoint ContainerID="76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" Namespace="calico-system" Pod="csi-node-driver-8v6wf" WorkloadEndpoint="localhost-k8s-csi--node--driver--8v6wf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--8v6wf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b24f406a-f736-4264-9766-c83335e6676c", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-8v6wf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3f6e261f7d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:22.674247 env[1216]: 2025-05-15 10:05:22.645 [INFO][4176] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" Namespace="calico-system" Pod="csi-node-driver-8v6wf" WorkloadEndpoint="localhost-k8s-csi--node--driver--8v6wf-eth0" May 15 10:05:22.674247 env[1216]: 2025-05-15 10:05:22.645 [INFO][4176] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3f6e261f7d1 ContainerID="76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" Namespace="calico-system" Pod="csi-node-driver-8v6wf" WorkloadEndpoint="localhost-k8s-csi--node--driver--8v6wf-eth0" May 15 10:05:22.674247 env[1216]: 2025-05-15 10:05:22.650 [INFO][4176] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" Namespace="calico-system" Pod="csi-node-driver-8v6wf" WorkloadEndpoint="localhost-k8s-csi--node--driver--8v6wf-eth0" May 15 10:05:22.674247 env[1216]: 2025-05-15 10:05:22.650 [INFO][4176] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" Namespace="calico-system" Pod="csi-node-driver-8v6wf" WorkloadEndpoint="localhost-k8s-csi--node--driver--8v6wf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--8v6wf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b24f406a-f736-4264-9766-c83335e6676c", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2", Pod:"csi-node-driver-8v6wf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3f6e261f7d1", MAC:"82:ea:cf:ae:27:d5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:22.674247 env[1216]: 2025-05-15 10:05:22.669 [INFO][4176] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2" Namespace="calico-system" Pod="csi-node-driver-8v6wf" WorkloadEndpoint="localhost-k8s-csi--node--driver--8v6wf-eth0" May 15 10:05:22.676000 audit[4201]: NETFILTER_CFG table=filter:114 family=2 entries=42 op=nft_register_chain pid=4201 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:05:22.676000 audit[4201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21000 a0=3 a1=fffff97da8e0 a2=0 a3=ffffaa966fa8 items=0 ppid=3213 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:22.676000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:05:22.693821 env[1216]: time="2025-05-15T10:05:22.693668017Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:05:22.694188 env[1216]: time="2025-05-15T10:05:22.693718378Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:05:22.694188 env[1216]: time="2025-05-15T10:05:22.693729378Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:05:22.694363 env[1216]: time="2025-05-15T10:05:22.694235472Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2 pid=4219 runtime=io.containerd.runc.v2 May 15 10:05:22.714492 systemd[1]: Started cri-containerd-76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2.scope. May 15 10:05:22.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.740000 audit: BPF prog-id=183 op=LOAD May 15 10:05:22.741000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4219 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:22.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736653238646164646534636433636663663533333466363638303863 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4219 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:22.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736653238646164646534636433636663663533333466363638303863 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit: BPF prog-id=184 op=LOAD May 15 10:05:22.741000 audit[4228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4219 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:22.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736653238646164646534636433636663663533333466363638303863 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit: BPF prog-id=185 op=LOAD May 15 10:05:22.741000 audit[4228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4219 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:22.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736653238646164646534636433636663663533333466363638303863 May 15 10:05:22.741000 audit: BPF prog-id=185 op=UNLOAD May 15 10:05:22.741000 audit: BPF prog-id=184 op=UNLOAD May 15 10:05:22.741000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:22.741000 audit: BPF prog-id=186 op=LOAD May 15 10:05:22.741000 audit[4228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4219 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:22.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736653238646164646534636433636663663533333466363638303863 May 15 10:05:22.743249 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:05:22.753403 env[1216]: time="2025-05-15T10:05:22.753355974Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8v6wf,Uid:b24f406a-f736-4264-9766-c83335e6676c,Namespace:calico-system,Attempt:1,} returns sandbox id \"76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2\"" May 15 10:05:23.092498 env[1216]: time="2025-05-15T10:05:23.092445483Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:23.093598 env[1216]: time="2025-05-15T10:05:23.093568791Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:23.094806 env[1216]: time="2025-05-15T10:05:23.094778382Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:23.096015 env[1216]: time="2025-05-15T10:05:23.095991333Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:23.096519 env[1216]: time="2025-05-15T10:05:23.096490386Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 15 10:05:23.098506 env[1216]: time="2025-05-15T10:05:23.098464556Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:05:23.099251 env[1216]: time="2025-05-15T10:05:23.099141493Z" level=info msg="CreateContainer within sandbox \"1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:05:23.111670 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1169446718.mount: Deactivated successfully. May 15 10:05:23.114366 env[1216]: time="2025-05-15T10:05:23.114324839Z" level=info msg="CreateContainer within sandbox \"1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"788bd82cb527db4ec5d304f080ef78f8de645af984e1b2d7c6ed9a2a58b0a265\"" May 15 10:05:23.114803 env[1216]: time="2025-05-15T10:05:23.114780891Z" level=info msg="StartContainer for \"788bd82cb527db4ec5d304f080ef78f8de645af984e1b2d7c6ed9a2a58b0a265\"" May 15 10:05:23.128108 systemd[1]: Started cri-containerd-788bd82cb527db4ec5d304f080ef78f8de645af984e1b2d7c6ed9a2a58b0a265.scope. May 15 10:05:23.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.149000 audit: BPF prog-id=187 op=LOAD May 15 10:05:23.150000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3764 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:23.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738386264383263623532376462346563356433303466303830656637 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3764 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:23.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738386264383263623532376462346563356433303466303830656637 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit: BPF prog-id=188 op=LOAD May 15 10:05:23.150000 audit[4260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3764 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:23.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738386264383263623532376462346563356433303466303830656637 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit: BPF prog-id=189 op=LOAD May 15 10:05:23.150000 audit[4260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3764 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:23.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738386264383263623532376462346563356433303466303830656637 May 15 10:05:23.150000 audit: BPF prog-id=189 op=UNLOAD May 15 10:05:23.150000 audit: BPF prog-id=188 op=UNLOAD May 15 10:05:23.150000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { perfmon } for pid=4260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.150000 audit: BPF prog-id=190 op=LOAD May 15 10:05:23.150000 audit[4260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3764 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:23.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738386264383263623532376462346563356433303466303830656637 May 15 10:05:23.169026 env[1216]: time="2025-05-15T10:05:23.168962070Z" level=info msg="StartContainer for \"788bd82cb527db4ec5d304f080ef78f8de645af984e1b2d7c6ed9a2a58b0a265\" returns successfully" May 15 10:05:23.351877 systemd-networkd[1052]: cali0527a3f4b02: Gained IPv6LL May 15 10:05:23.412428 systemd-networkd[1052]: cali43129fcc65c: Gained IPv6LL May 15 10:05:23.435426 kubelet[1951]: E0515 10:05:23.435189 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:23.451020 kubelet[1951]: I0515 10:05:23.450941 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-544995c86d-2cmzm" podStartSLOduration=25.085287285 podStartE2EDuration="27.450925566s" podCreationTimestamp="2025-05-15 10:04:56 +0000 UTC" firstStartedPulling="2025-05-15 10:05:20.732216459 +0000 UTC m=+36.519457619" lastFinishedPulling="2025-05-15 10:05:23.09785474 +0000 UTC m=+38.885095900" observedRunningTime="2025-05-15 10:05:23.450568517 +0000 UTC m=+39.237809677" watchObservedRunningTime="2025-05-15 10:05:23.450925566 +0000 UTC m=+39.238166686" May 15 10:05:23.459399 env[1216]: time="2025-05-15T10:05:23.459335500Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:23.460900 env[1216]: time="2025-05-15T10:05:23.460855659Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:23.462339 env[1216]: time="2025-05-15T10:05:23.462307136Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:23.463991 env[1216]: time="2025-05-15T10:05:23.463958258Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:23.464420 env[1216]: time="2025-05-15T10:05:23.464389309Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 15 10:05:23.465719 env[1216]: time="2025-05-15T10:05:23.465679502Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 15 10:05:23.467140 env[1216]: time="2025-05-15T10:05:23.467101898Z" level=info msg="CreateContainer within sandbox \"c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:05:23.476712 env[1216]: time="2025-05-15T10:05:23.476656381Z" level=info msg="CreateContainer within sandbox \"c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2319e2e555859f4d3b05399c2bf91457307ae8f17afb4672bbfbba1ce5f31fa6\"" May 15 10:05:23.478718 env[1216]: time="2025-05-15T10:05:23.477500962Z" level=info msg="StartContainer for \"2319e2e555859f4d3b05399c2bf91457307ae8f17afb4672bbfbba1ce5f31fa6\"" May 15 10:05:23.501144 systemd[1]: Started cri-containerd-2319e2e555859f4d3b05399c2bf91457307ae8f17afb4672bbfbba1ce5f31fa6.scope. May 15 10:05:23.526000 audit[4316]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4316 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:23.526000 audit[4316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffc869bac0 a2=0 a3=1 items=0 ppid=2126 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:23.526000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:23.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit: BPF prog-id=191 op=LOAD May 15 10:05:23.538000 audit[4316]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4316 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:23.538000 audit[4299]: AVC avc: denied { bpf } for pid=4299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3821 pid=4299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:23.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313965326535353538353966346433623035333939633262663931 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { perfmon } for pid=4299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3821 pid=4299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:23.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313965326535353538353966346433623035333939633262663931 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { bpf } for pid=4299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { bpf } for pid=4299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { bpf } for pid=4299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { perfmon } for pid=4299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { perfmon } for pid=4299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { perfmon } for pid=4299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { perfmon } for pid=4299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { perfmon } for pid=4299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { bpf } for pid=4299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { bpf } for pid=4299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit: BPF prog-id=192 op=LOAD May 15 10:05:23.538000 audit[4299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3821 pid=4299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:23.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313965326535353538353966346433623035333939633262663931 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { bpf } for pid=4299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { bpf } for pid=4299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { perfmon } for pid=4299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { perfmon } for pid=4299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { perfmon } for pid=4299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { perfmon } for pid=4299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { perfmon } for pid=4299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { bpf } for pid=4299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit[4299]: AVC avc: denied { bpf } for pid=4299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.538000 audit: BPF prog-id=193 op=LOAD May 15 10:05:23.538000 audit[4299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3821 pid=4299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:23.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313965326535353538353966346433623035333939633262663931 May 15 10:05:23.539000 audit: BPF prog-id=193 op=UNLOAD May 15 10:05:23.539000 audit: BPF prog-id=192 op=UNLOAD May 15 10:05:23.539000 audit[4299]: AVC avc: denied { bpf } for pid=4299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.539000 audit[4299]: AVC avc: denied { bpf } for pid=4299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.539000 audit[4299]: AVC avc: denied { bpf } for pid=4299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.539000 audit[4299]: AVC avc: denied { perfmon } for pid=4299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.539000 audit[4299]: AVC avc: denied { perfmon } for pid=4299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.539000 audit[4299]: AVC avc: denied { perfmon } for pid=4299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.539000 audit[4299]: AVC avc: denied { perfmon } for pid=4299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.539000 audit[4299]: AVC avc: denied { perfmon } for pid=4299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.539000 audit[4299]: AVC avc: denied { bpf } for pid=4299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.539000 audit[4299]: AVC avc: denied { bpf } for pid=4299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:23.539000 audit: BPF prog-id=194 op=LOAD May 15 10:05:23.539000 audit[4299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3821 pid=4299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:23.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313965326535353538353966346433623035333939633262663931 May 15 10:05:23.538000 audit[4316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc869bac0 a2=0 a3=1 items=0 ppid=2126 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:23.538000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:23.580457 env[1216]: time="2025-05-15T10:05:23.580392181Z" level=info msg="StartContainer for \"2319e2e555859f4d3b05399c2bf91457307ae8f17afb4672bbfbba1ce5f31fa6\" returns successfully" May 15 10:05:24.440818 kubelet[1951]: E0515 10:05:24.440770 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:24.472000 audit[4341]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:24.472000 audit[4341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffff82171d0 a2=0 a3=1 items=0 ppid=2126 pid=4341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:24.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:24.487000 audit[4341]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:24.487000 audit[4341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff82171d0 a2=0 a3=1 items=0 ppid=2126 pid=4341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:24.487000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:24.564418 systemd-networkd[1052]: cali3f6e261f7d1: Gained IPv6LL May 15 10:05:24.958334 kernel: kauditd_printk_skb: 625 callbacks suppressed May 15 10:05:24.958486 kernel: audit: type=1400 audit(1747303524.955:1307): avc: denied { watch } for pid=4271 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_05_05.4053151134/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c382 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c262,c382 tclass=file permissive=0 May 15 10:05:24.955000 audit[4271]: AVC avc: denied { watch } for pid=4271 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_05_05.4053151134/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c382 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c262,c382 tclass=file permissive=0 May 15 10:05:24.955000 audit[4271]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40006a8040 a2=fc6 a3=0 items=0 ppid=3764 pid=4271 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c382 key=(null) May 15 10:05:24.963598 kernel: audit: type=1300 audit(1747303524.955:1307): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40006a8040 a2=fc6 a3=0 items=0 ppid=3764 pid=4271 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c382 key=(null) May 15 10:05:24.963711 kernel: audit: type=1327 audit(1747303524.955:1307): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:05:24.955000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:05:24.985238 kubelet[1951]: I0515 10:05:24.985175 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-544995c86d-8l9dj" podStartSLOduration=26.317376586 podStartE2EDuration="28.985159423s" podCreationTimestamp="2025-05-15 10:04:56 +0000 UTC" firstStartedPulling="2025-05-15 10:05:20.797694739 +0000 UTC m=+36.584935899" lastFinishedPulling="2025-05-15 10:05:23.465477576 +0000 UTC m=+39.252718736" observedRunningTime="2025-05-15 10:05:24.455942192 +0000 UTC m=+40.243183472" watchObservedRunningTime="2025-05-15 10:05:24.985159423 +0000 UTC m=+40.772400583" May 15 10:05:25.387000 audit[4310]: AVC avc: denied { watch } for pid=4310 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_05_05.988993212/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c270,c984 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c270,c984 tclass=file permissive=0 May 15 10:05:25.387000 audit[4310]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000d134c0 a2=fc6 a3=0 items=0 ppid=3821 pid=4310 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c270,c984 key=(null) May 15 10:05:25.395460 kernel: audit: type=1400 audit(1747303525.387:1308): avc: denied { watch } for pid=4310 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_05_05.988993212/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c270,c984 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c270,c984 tclass=file permissive=0 May 15 10:05:25.395560 kernel: audit: type=1300 audit(1747303525.387:1308): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000d134c0 a2=fc6 a3=0 items=0 ppid=3821 pid=4310 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c270,c984 key=(null) May 15 10:05:25.395580 kernel: audit: type=1327 audit(1747303525.387:1308): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:05:25.387000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:05:25.513000 audit[4344]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:25.513000 audit[4344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffeafb25d0 a2=0 a3=1 items=0 ppid=2126 pid=4344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:25.521844 kernel: audit: type=1325 audit(1747303525.513:1309): table=filter:119 family=2 entries=9 op=nft_register_rule pid=4344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:25.522040 kernel: audit: type=1300 audit(1747303525.513:1309): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffeafb25d0 a2=0 a3=1 items=0 ppid=2126 pid=4344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:25.524640 kernel: audit: type=1327 audit(1747303525.513:1309): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:25.513000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:25.533000 audit[4344]: NETFILTER_CFG table=nat:120 family=2 entries=31 op=nft_register_chain pid=4344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:25.533000 audit[4344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffeafb25d0 a2=0 a3=1 items=0 ppid=2126 pid=4344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:25.533000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:25.537327 kernel: audit: type=1325 audit(1747303525.533:1310): table=nat:120 family=2 entries=31 op=nft_register_chain pid=4344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:25.623106 env[1216]: time="2025-05-15T10:05:25.623055686Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:25.625745 env[1216]: time="2025-05-15T10:05:25.625709790Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:25.627690 env[1216]: time="2025-05-15T10:05:25.627651877Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:25.629697 env[1216]: time="2025-05-15T10:05:25.629665846Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:25.630210 env[1216]: time="2025-05-15T10:05:25.630176578Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814\"" May 15 10:05:25.632199 env[1216]: time="2025-05-15T10:05:25.632168187Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 10:05:25.645645 env[1216]: time="2025-05-15T10:05:25.645547352Z" level=info msg="CreateContainer within sandbox \"89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 15 10:05:25.665628 env[1216]: time="2025-05-15T10:05:25.665580318Z" level=info msg="CreateContainer within sandbox \"89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"e00c94fe601a57c49706cbbb1ed7340a8e9fb855475256fedb861960e43c4fda\"" May 15 10:05:25.666579 env[1216]: time="2025-05-15T10:05:25.666546622Z" level=info msg="StartContainer for \"e00c94fe601a57c49706cbbb1ed7340a8e9fb855475256fedb861960e43c4fda\"" May 15 10:05:25.687941 systemd[1]: Started cri-containerd-e00c94fe601a57c49706cbbb1ed7340a8e9fb855475256fedb861960e43c4fda.scope. May 15 10:05:25.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit: BPF prog-id=195 op=LOAD May 15 10:05:25.726000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4072 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:25.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530306339346665363031613537633439373036636262623165643733 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4072 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:25.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530306339346665363031613537633439373036636262623165643733 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit: BPF prog-id=196 op=LOAD May 15 10:05:25.726000 audit[4354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4072 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:25.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530306339346665363031613537633439373036636262623165643733 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit: BPF prog-id=197 op=LOAD May 15 10:05:25.726000 audit[4354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4072 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:25.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530306339346665363031613537633439373036636262623165643733 May 15 10:05:25.726000 audit: BPF prog-id=197 op=UNLOAD May 15 10:05:25.726000 audit: BPF prog-id=196 op=UNLOAD May 15 10:05:25.726000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:25.726000 audit: BPF prog-id=198 op=LOAD May 15 10:05:25.726000 audit[4354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4072 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:25.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530306339346665363031613537633439373036636262623165643733 May 15 10:05:25.749421 env[1216]: time="2025-05-15T10:05:25.749363873Z" level=info msg="StartContainer for \"e00c94fe601a57c49706cbbb1ed7340a8e9fb855475256fedb861960e43c4fda\" returns successfully" May 15 10:05:25.891675 systemd[1]: Started sshd@9-10.0.0.18:22-10.0.0.1:53374.service. May 15 10:05:25.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.18:22-10.0.0.1:53374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:25.937000 audit[4385]: USER_ACCT pid=4385 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:25.939000 audit[4385]: CRED_ACQ pid=4385 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:25.939000 audit[4385]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcd9df6e0 a2=3 a3=1 items=0 ppid=1 pid=4385 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:25.939000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:05:25.941511 sshd[4385]: Accepted publickey for core from 10.0.0.1 port 53374 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:05:25.941491 sshd[4385]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:05:25.945108 systemd-logind[1208]: New session 10 of user core. May 15 10:05:25.946050 systemd[1]: Started session-10.scope. May 15 10:05:25.948000 audit[4385]: USER_START pid=4385 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:25.949000 audit[4387]: CRED_ACQ pid=4387 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:26.113921 sshd[4385]: pam_unix(sshd:session): session closed for user core May 15 10:05:26.114000 audit[4385]: USER_END pid=4385 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:26.116000 audit[4385]: CRED_DISP pid=4385 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:26.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.18:22-10.0.0.1:53384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:26.117965 systemd[1]: Started sshd@10-10.0.0.18:22-10.0.0.1:53384.service. May 15 10:05:26.119691 systemd-logind[1208]: Session 10 logged out. Waiting for processes to exit. May 15 10:05:26.119903 systemd[1]: sshd@9-10.0.0.18:22-10.0.0.1:53374.service: Deactivated successfully. May 15 10:05:26.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.18:22-10.0.0.1:53374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:26.120608 systemd[1]: session-10.scope: Deactivated successfully. May 15 10:05:26.121182 systemd-logind[1208]: Removed session 10. May 15 10:05:26.149000 audit[4398]: USER_ACCT pid=4398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:26.151519 sshd[4398]: Accepted publickey for core from 10.0.0.1 port 53384 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:05:26.151000 audit[4398]: CRED_ACQ pid=4398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:26.151000 audit[4398]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd1fe02e0 a2=3 a3=1 items=0 ppid=1 pid=4398 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:26.151000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:05:26.152872 sshd[4398]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:05:26.156387 systemd-logind[1208]: New session 11 of user core. May 15 10:05:26.157302 systemd[1]: Started session-11.scope. May 15 10:05:26.159000 audit[4398]: USER_START pid=4398 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:26.161000 audit[4401]: CRED_ACQ pid=4401 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:26.330696 sshd[4398]: pam_unix(sshd:session): session closed for user core May 15 10:05:26.334000 audit[4398]: USER_END pid=4398 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:26.334000 audit[4398]: CRED_DISP pid=4398 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:26.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.18:22-10.0.0.1:53398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:26.337676 systemd[1]: Started sshd@11-10.0.0.18:22-10.0.0.1:53398.service. May 15 10:05:26.338842 systemd[1]: sshd@10-10.0.0.18:22-10.0.0.1:53384.service: Deactivated successfully. May 15 10:05:26.340365 systemd[1]: session-11.scope: Deactivated successfully. May 15 10:05:26.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.18:22-10.0.0.1:53384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:26.341222 systemd-logind[1208]: Session 11 logged out. Waiting for processes to exit. May 15 10:05:26.342657 systemd-logind[1208]: Removed session 11. May 15 10:05:26.379000 audit[4410]: USER_ACCT pid=4410 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:26.380657 sshd[4410]: Accepted publickey for core from 10.0.0.1 port 53398 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:05:26.380000 audit[4410]: CRED_ACQ pid=4410 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:26.380000 audit[4410]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7948680 a2=3 a3=1 items=0 ppid=1 pid=4410 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:26.380000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:05:26.381966 sshd[4410]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:05:26.385249 systemd-logind[1208]: New session 12 of user core. May 15 10:05:26.386105 systemd[1]: Started session-12.scope. May 15 10:05:26.388000 audit[4410]: USER_START pid=4410 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:26.389000 audit[4414]: CRED_ACQ pid=4414 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:26.457080 kubelet[1951]: I0515 10:05:26.457008 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-85df6c8f48-khsxw" podStartSLOduration=24.604961142 podStartE2EDuration="28.45698898s" podCreationTimestamp="2025-05-15 10:04:58 +0000 UTC" firstStartedPulling="2025-05-15 10:05:21.779181046 +0000 UTC m=+37.566422206" lastFinishedPulling="2025-05-15 10:05:25.631208884 +0000 UTC m=+41.418450044" observedRunningTime="2025-05-15 10:05:26.456899938 +0000 UTC m=+42.244141098" watchObservedRunningTime="2025-05-15 10:05:26.45698898 +0000 UTC m=+42.244230100" May 15 10:05:26.527362 sshd[4410]: pam_unix(sshd:session): session closed for user core May 15 10:05:26.527000 audit[4410]: USER_END pid=4410 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:26.527000 audit[4410]: CRED_DISP pid=4410 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:26.530127 systemd[1]: sshd@11-10.0.0.18:22-10.0.0.1:53398.service: Deactivated successfully. May 15 10:05:26.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.18:22-10.0.0.1:53398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:26.530908 systemd[1]: session-12.scope: Deactivated successfully. May 15 10:05:26.531468 systemd-logind[1208]: Session 12 logged out. Waiting for processes to exit. May 15 10:05:26.532085 systemd-logind[1208]: Removed session 12. May 15 10:05:27.110924 env[1216]: time="2025-05-15T10:05:27.110859263Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:27.112316 env[1216]: time="2025-05-15T10:05:27.112284616Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:27.113948 env[1216]: time="2025-05-15T10:05:27.113918814Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:27.115060 env[1216]: time="2025-05-15T10:05:27.115030200Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:27.115590 env[1216]: time="2025-05-15T10:05:27.115550252Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b\"" May 15 10:05:27.120416 env[1216]: time="2025-05-15T10:05:27.119895433Z" level=info msg="CreateContainer within sandbox \"76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 10:05:27.132751 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2416766409.mount: Deactivated successfully. May 15 10:05:27.134788 env[1216]: time="2025-05-15T10:05:27.134657017Z" level=info msg="CreateContainer within sandbox \"76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"c2b1d60ca5a8e81986e5fa6818d557a538ed6d7ee071a7d4c0a52f99adeca8b2\"" May 15 10:05:27.140872 env[1216]: time="2025-05-15T10:05:27.140824440Z" level=info msg="StartContainer for \"c2b1d60ca5a8e81986e5fa6818d557a538ed6d7ee071a7d4c0a52f99adeca8b2\"" May 15 10:05:27.168870 systemd[1]: Started cri-containerd-c2b1d60ca5a8e81986e5fa6818d557a538ed6d7ee071a7d4c0a52f99adeca8b2.scope. May 15 10:05:27.206000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.206000 audit[4432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4219 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:27.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332623164363063613561386538313938366535666136383138643535 May 15 10:05:27.206000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.206000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.206000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.206000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.206000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.206000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.206000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.206000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.206000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.206000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.206000 audit: BPF prog-id=199 op=LOAD May 15 10:05:27.206000 audit[4432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4219 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:27.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332623164363063613561386538313938366535666136383138643535 May 15 10:05:27.207000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.207000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.207000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.207000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.207000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.207000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.207000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.207000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.207000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.207000 audit: BPF prog-id=200 op=LOAD May 15 10:05:27.207000 audit[4432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4219 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:27.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332623164363063613561386538313938366535666136383138643535 May 15 10:05:27.208000 audit: BPF prog-id=200 op=UNLOAD May 15 10:05:27.208000 audit: BPF prog-id=199 op=UNLOAD May 15 10:05:27.208000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.208000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.208000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.208000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.208000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.208000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.208000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.208000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.208000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.208000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:27.208000 audit: BPF prog-id=201 op=LOAD May 15 10:05:27.208000 audit[4432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4219 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:27.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332623164363063613561386538313938366535666136383138643535 May 15 10:05:27.230338 env[1216]: time="2025-05-15T10:05:27.230283642Z" level=info msg="StartContainer for \"c2b1d60ca5a8e81986e5fa6818d557a538ed6d7ee071a7d4c0a52f99adeca8b2\" returns successfully" May 15 10:05:27.231603 env[1216]: time="2025-05-15T10:05:27.231563551Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 10:05:27.636735 systemd[1]: run-containerd-runc-k8s.io-c2b1d60ca5a8e81986e5fa6818d557a538ed6d7ee071a7d4c0a52f99adeca8b2-runc.AtiQRb.mount: Deactivated successfully. May 15 10:05:28.868347 env[1216]: time="2025-05-15T10:05:28.868293833Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:28.870119 env[1216]: time="2025-05-15T10:05:28.870083714Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:28.875343 env[1216]: time="2025-05-15T10:05:28.875305073Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:28.876927 env[1216]: time="2025-05-15T10:05:28.876890789Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:05:28.877539 env[1216]: time="2025-05-15T10:05:28.877502603Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc\"" May 15 10:05:28.881011 env[1216]: time="2025-05-15T10:05:28.880975362Z" level=info msg="CreateContainer within sandbox \"76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 10:05:28.893064 env[1216]: time="2025-05-15T10:05:28.893030237Z" level=info msg="CreateContainer within sandbox \"76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"9d2bea7db11d7d45833ae70d4e60d138d8d9872fe9531a9af5197f5c0d854f8e\"" May 15 10:05:28.893893 env[1216]: time="2025-05-15T10:05:28.893849136Z" level=info msg="StartContainer for \"9d2bea7db11d7d45833ae70d4e60d138d8d9872fe9531a9af5197f5c0d854f8e\"" May 15 10:05:28.917755 systemd[1]: Started cri-containerd-9d2bea7db11d7d45833ae70d4e60d138d8d9872fe9531a9af5197f5c0d854f8e.scope. May 15 10:05:28.946000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4219 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:28.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964326265613764623131643764343538333361653730643465363064 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit: BPF prog-id=202 op=LOAD May 15 10:05:28.946000 audit[4489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4219 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:28.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964326265613764623131643764343538333361653730643465363064 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit: BPF prog-id=203 op=LOAD May 15 10:05:28.946000 audit[4489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4219 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:28.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964326265613764623131643764343538333361653730643465363064 May 15 10:05:28.946000 audit: BPF prog-id=203 op=UNLOAD May 15 10:05:28.946000 audit: BPF prog-id=202 op=UNLOAD May 15 10:05:28.946000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:05:28.946000 audit: BPF prog-id=204 op=LOAD May 15 10:05:28.946000 audit[4489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4219 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:28.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964326265613764623131643764343538333361653730643465363064 May 15 10:05:28.967070 env[1216]: time="2025-05-15T10:05:28.967019004Z" level=info msg="StartContainer for \"9d2bea7db11d7d45833ae70d4e60d138d8d9872fe9531a9af5197f5c0d854f8e\" returns successfully" May 15 10:05:29.381049 kubelet[1951]: I0515 10:05:29.380965 1951 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 10:05:29.381049 kubelet[1951]: I0515 10:05:29.381041 1951 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 10:05:29.477954 kubelet[1951]: I0515 10:05:29.477756 1951 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-8v6wf" podStartSLOduration=26.353830425 podStartE2EDuration="32.477740204s" podCreationTimestamp="2025-05-15 10:04:57 +0000 UTC" firstStartedPulling="2025-05-15 10:05:22.754865813 +0000 UTC m=+38.542106973" lastFinishedPulling="2025-05-15 10:05:28.878775592 +0000 UTC m=+44.666016752" observedRunningTime="2025-05-15 10:05:29.477367035 +0000 UTC m=+45.264608155" watchObservedRunningTime="2025-05-15 10:05:29.477740204 +0000 UTC m=+45.264981364" May 15 10:05:31.532326 systemd[1]: Started sshd@12-10.0.0.18:22-10.0.0.1:53406.service. May 15 10:05:31.533275 kernel: kauditd_printk_skb: 178 callbacks suppressed May 15 10:05:31.533418 kernel: audit: type=1130 audit(1747303531.531:1368): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.18:22-10.0.0.1:53406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:31.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.18:22-10.0.0.1:53406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:31.578000 audit[4525]: USER_ACCT pid=4525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:31.581358 sshd[4525]: Accepted publickey for core from 10.0.0.1 port 53406 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:05:31.579000 audit[4525]: CRED_ACQ pid=4525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:31.583363 sshd[4525]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:05:31.585936 kernel: audit: type=1101 audit(1747303531.578:1369): pid=4525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:31.586012 kernel: audit: type=1103 audit(1747303531.579:1370): pid=4525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:31.586066 kernel: audit: type=1006 audit(1747303531.579:1371): pid=4525 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 15 10:05:31.579000 audit[4525]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd5f91480 a2=3 a3=1 items=0 ppid=1 pid=4525 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:31.590197 kernel: audit: type=1300 audit(1747303531.579:1371): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd5f91480 a2=3 a3=1 items=0 ppid=1 pid=4525 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:31.590315 kernel: audit: type=1327 audit(1747303531.579:1371): proctitle=737368643A20636F7265205B707269765D May 15 10:05:31.579000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:05:31.592810 systemd-logind[1208]: New session 13 of user core. May 15 10:05:31.593303 systemd[1]: Started session-13.scope. May 15 10:05:31.598000 audit[4525]: USER_START pid=4525 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:31.599000 audit[4527]: CRED_ACQ pid=4527 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:31.604734 kernel: audit: type=1105 audit(1747303531.598:1372): pid=4525 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:31.604906 kernel: audit: type=1103 audit(1747303531.599:1373): pid=4527 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:31.778073 sshd[4525]: pam_unix(sshd:session): session closed for user core May 15 10:05:31.778000 audit[4525]: USER_END pid=4525 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:31.778000 audit[4525]: CRED_DISP pid=4525 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:31.785963 kernel: audit: type=1106 audit(1747303531.778:1374): pid=4525 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:31.786055 kernel: audit: type=1104 audit(1747303531.778:1375): pid=4525 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:31.789638 systemd[1]: session-13.scope: Deactivated successfully. May 15 10:05:31.790224 systemd-logind[1208]: Session 13 logged out. Waiting for processes to exit. May 15 10:05:31.790396 systemd[1]: sshd@12-10.0.0.18:22-10.0.0.1:53406.service: Deactivated successfully. May 15 10:05:31.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.18:22-10.0.0.1:53406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:31.791465 systemd-logind[1208]: Removed session 13. May 15 10:05:36.787837 systemd[1]: Started sshd@13-10.0.0.18:22-10.0.0.1:48752.service. May 15 10:05:36.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.18:22-10.0.0.1:48752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:36.788512 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:05:36.788555 kernel: audit: type=1130 audit(1747303536.786:1377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.18:22-10.0.0.1:48752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:36.846000 audit[4547]: USER_ACCT pid=4547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:36.848044 sshd[4547]: Accepted publickey for core from 10.0.0.1 port 48752 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:05:36.849407 sshd[4547]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:05:36.847000 audit[4547]: CRED_ACQ pid=4547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:36.853085 kernel: audit: type=1101 audit(1747303536.846:1378): pid=4547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:36.853155 kernel: audit: type=1103 audit(1747303536.847:1379): pid=4547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:36.853189 kernel: audit: type=1006 audit(1747303536.847:1380): pid=4547 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 15 10:05:36.847000 audit[4547]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4fdea50 a2=3 a3=1 items=0 ppid=1 pid=4547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:36.857354 kernel: audit: type=1300 audit(1747303536.847:1380): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4fdea50 a2=3 a3=1 items=0 ppid=1 pid=4547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:36.857498 kernel: audit: type=1327 audit(1747303536.847:1380): proctitle=737368643A20636F7265205B707269765D May 15 10:05:36.847000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:05:36.857453 systemd[1]: Started session-14.scope. May 15 10:05:36.857618 systemd-logind[1208]: New session 14 of user core. May 15 10:05:36.860000 audit[4547]: USER_START pid=4547 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:36.862000 audit[4549]: CRED_ACQ pid=4549 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:36.866666 kernel: audit: type=1105 audit(1747303536.860:1381): pid=4547 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:36.866738 kernel: audit: type=1103 audit(1747303536.862:1382): pid=4549 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:36.981589 sshd[4547]: pam_unix(sshd:session): session closed for user core May 15 10:05:36.981000 audit[4547]: USER_END pid=4547 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:36.981000 audit[4547]: CRED_DISP pid=4547 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:36.987451 kernel: audit: type=1106 audit(1747303536.981:1383): pid=4547 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:36.987520 kernel: audit: type=1104 audit(1747303536.981:1384): pid=4547 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:36.991075 systemd[1]: session-14.scope: Deactivated successfully. May 15 10:05:36.991763 systemd[1]: sshd@13-10.0.0.18:22-10.0.0.1:48752.service: Deactivated successfully. May 15 10:05:36.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.18:22-10.0.0.1:48752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:36.992335 systemd-logind[1208]: Session 14 logged out. Waiting for processes to exit. May 15 10:05:36.992977 systemd-logind[1208]: Removed session 14. May 15 10:05:37.808317 systemd[1]: run-containerd-runc-k8s.io-e00c94fe601a57c49706cbbb1ed7340a8e9fb855475256fedb861960e43c4fda-runc.UD8F52.mount: Deactivated successfully. May 15 10:05:39.100552 systemd[1]: run-containerd-runc-k8s.io-c06509ba7285598d928fd11235148efc3799d6ff32f92301ef6bdea460cfeb17-runc.nB8Aw6.mount: Deactivated successfully. May 15 10:05:39.170004 kubelet[1951]: E0515 10:05:39.169970 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:41.454000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:05:41.454000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001156b10 a2=fc6 a3=0 items=0 ppid=1669 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 key=(null) May 15 10:05:41.454000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:05:41.454000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:05:41.454000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001bf6500 a2=fc6 a3=0 items=0 ppid=1669 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 key=(null) May 15 10:05:41.454000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:05:41.505000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:05:41.505000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:05:41.505000 audit[1823]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=4010855d10 a2=fc6 a3=0 items=0 ppid=1668 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 key=(null) May 15 10:05:41.505000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:05:41.505000 audit[1823]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=79 a1=401006a5a0 a2=fc6 a3=0 items=0 ppid=1668 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 key=(null) May 15 10:05:41.505000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:05:41.505000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:05:41.505000 audit[1823]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=78 a1=400e654300 a2=fc6 a3=0 items=0 ppid=1668 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 key=(null) May 15 10:05:41.505000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:05:41.507000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7294 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:05:41.507000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:05:41.507000 audit[1823]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=4010d63920 a2=fc6 a3=0 items=0 ppid=1668 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 key=(null) May 15 10:05:41.507000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:05:41.507000 audit[1823]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=78 a1=400e654360 a2=fc6 a3=0 items=0 ppid=1668 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 key=(null) May 15 10:05:41.507000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:05:41.507000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:05:41.507000 audit[1823]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=79 a1=401006a5c0 a2=fc6 a3=0 items=0 ppid=1668 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c293 key=(null) May 15 10:05:41.507000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:05:41.986276 systemd[1]: Started sshd@14-10.0.0.18:22-10.0.0.1:48768.service. May 15 10:05:41.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.18:22-10.0.0.1:48768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:41.988962 kernel: kauditd_printk_skb: 25 callbacks suppressed May 15 10:05:41.989198 kernel: audit: type=1130 audit(1747303541.985:1394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.18:22-10.0.0.1:48768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:42.023000 audit[4603]: USER_ACCT pid=4603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:42.024890 sshd[4603]: Accepted publickey for core from 10.0.0.1 port 48768 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:05:42.026674 sshd[4603]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:05:42.025000 audit[4603]: CRED_ACQ pid=4603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:42.029575 kernel: audit: type=1101 audit(1747303542.023:1395): pid=4603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:42.029633 kernel: audit: type=1103 audit(1747303542.025:1396): pid=4603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:42.029666 kernel: audit: type=1006 audit(1747303542.025:1397): pid=4603 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 15 10:05:42.030948 kernel: audit: type=1300 audit(1747303542.025:1397): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9852710 a2=3 a3=1 items=0 ppid=1 pid=4603 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:42.025000 audit[4603]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9852710 a2=3 a3=1 items=0 ppid=1 pid=4603 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:42.033394 kernel: audit: type=1327 audit(1747303542.025:1397): proctitle=737368643A20636F7265205B707269765D May 15 10:05:42.025000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:05:42.033558 systemd[1]: Started session-15.scope. May 15 10:05:42.033747 systemd-logind[1208]: New session 15 of user core. May 15 10:05:42.037000 audit[4603]: USER_START pid=4603 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:42.039000 audit[4605]: CRED_ACQ pid=4605 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:42.043369 kernel: audit: type=1105 audit(1747303542.037:1398): pid=4603 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:42.043419 kernel: audit: type=1103 audit(1747303542.039:1399): pid=4605 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:42.166353 sshd[4603]: pam_unix(sshd:session): session closed for user core May 15 10:05:42.166000 audit[4603]: USER_END pid=4603 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:42.169890 systemd[1]: sshd@14-10.0.0.18:22-10.0.0.1:48768.service: Deactivated successfully. May 15 10:05:42.167000 audit[4603]: CRED_DISP pid=4603 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:42.170687 systemd[1]: session-15.scope: Deactivated successfully. May 15 10:05:42.171242 systemd-logind[1208]: Session 15 logged out. Waiting for processes to exit. May 15 10:05:42.172090 systemd-logind[1208]: Removed session 15. May 15 10:05:42.172851 kernel: audit: type=1106 audit(1747303542.166:1400): pid=4603 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:42.172891 kernel: audit: type=1104 audit(1747303542.167:1401): pid=4603 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:42.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.18:22-10.0.0.1:48768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:44.286722 env[1216]: time="2025-05-15T10:05:44.286684567Z" level=info msg="StopPodSandbox for \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\"" May 15 10:05:44.378337 env[1216]: 2025-05-15 10:05:44.336 [WARNING][4634] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0", GenerateName:"calico-apiserver-544995c86d-", Namespace:"calico-apiserver", SelfLink:"", UID:"b33edbce-e854-4547-85f6-10c1e7fcf595", ResourceVersion:"913", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"544995c86d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a", Pod:"calico-apiserver-544995c86d-2cmzm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali00bd6f8cae4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:44.378337 env[1216]: 2025-05-15 10:05:44.336 [INFO][4634] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" May 15 10:05:44.378337 env[1216]: 2025-05-15 10:05:44.336 [INFO][4634] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" iface="eth0" netns="" May 15 10:05:44.378337 env[1216]: 2025-05-15 10:05:44.336 [INFO][4634] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" May 15 10:05:44.378337 env[1216]: 2025-05-15 10:05:44.336 [INFO][4634] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" May 15 10:05:44.378337 env[1216]: 2025-05-15 10:05:44.365 [INFO][4644] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" HandleID="k8s-pod-network.bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" Workload="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" May 15 10:05:44.378337 env[1216]: 2025-05-15 10:05:44.365 [INFO][4644] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:44.378337 env[1216]: 2025-05-15 10:05:44.365 [INFO][4644] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:44.378337 env[1216]: 2025-05-15 10:05:44.373 [WARNING][4644] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" HandleID="k8s-pod-network.bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" Workload="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" May 15 10:05:44.378337 env[1216]: 2025-05-15 10:05:44.373 [INFO][4644] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" HandleID="k8s-pod-network.bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" Workload="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" May 15 10:05:44.378337 env[1216]: 2025-05-15 10:05:44.375 [INFO][4644] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:44.378337 env[1216]: 2025-05-15 10:05:44.376 [INFO][4634] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" May 15 10:05:44.378796 env[1216]: time="2025-05-15T10:05:44.378371048Z" level=info msg="TearDown network for sandbox \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\" successfully" May 15 10:05:44.378796 env[1216]: time="2025-05-15T10:05:44.378402568Z" level=info msg="StopPodSandbox for \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\" returns successfully" May 15 10:05:44.379324 env[1216]: time="2025-05-15T10:05:44.379295344Z" level=info msg="RemovePodSandbox for \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\"" May 15 10:05:44.379400 env[1216]: time="2025-05-15T10:05:44.379332225Z" level=info msg="Forcibly stopping sandbox \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\"" May 15 10:05:44.497385 env[1216]: 2025-05-15 10:05:44.416 [WARNING][4667] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0", GenerateName:"calico-apiserver-544995c86d-", Namespace:"calico-apiserver", SelfLink:"", UID:"b33edbce-e854-4547-85f6-10c1e7fcf595", ResourceVersion:"913", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"544995c86d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1a7376efa3797a9ef1a13257142f13a9de3a2d4b678f57c38446d447489f866a", Pod:"calico-apiserver-544995c86d-2cmzm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali00bd6f8cae4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:44.497385 env[1216]: 2025-05-15 10:05:44.416 [INFO][4667] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" May 15 10:05:44.497385 env[1216]: 2025-05-15 10:05:44.416 [INFO][4667] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" iface="eth0" netns="" May 15 10:05:44.497385 env[1216]: 2025-05-15 10:05:44.416 [INFO][4667] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" May 15 10:05:44.497385 env[1216]: 2025-05-15 10:05:44.416 [INFO][4667] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" May 15 10:05:44.497385 env[1216]: 2025-05-15 10:05:44.442 [INFO][4675] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" HandleID="k8s-pod-network.bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" Workload="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" May 15 10:05:44.497385 env[1216]: 2025-05-15 10:05:44.443 [INFO][4675] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:44.497385 env[1216]: 2025-05-15 10:05:44.443 [INFO][4675] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:44.497385 env[1216]: 2025-05-15 10:05:44.479 [WARNING][4675] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" HandleID="k8s-pod-network.bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" Workload="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" May 15 10:05:44.497385 env[1216]: 2025-05-15 10:05:44.479 [INFO][4675] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" HandleID="k8s-pod-network.bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" Workload="localhost-k8s-calico--apiserver--544995c86d--2cmzm-eth0" May 15 10:05:44.497385 env[1216]: 2025-05-15 10:05:44.490 [INFO][4675] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:44.497385 env[1216]: 2025-05-15 10:05:44.493 [INFO][4667] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4" May 15 10:05:44.497819 env[1216]: time="2025-05-15T10:05:44.497405749Z" level=info msg="TearDown network for sandbox \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\" successfully" May 15 10:05:44.515627 env[1216]: time="2025-05-15T10:05:44.515580722Z" level=info msg="RemovePodSandbox \"bfe20936717ed60b6eb052419f62ed8cb90961713c943ffe78939b7fc904d4d4\" returns successfully" May 15 10:05:44.516249 env[1216]: time="2025-05-15T10:05:44.516227374Z" level=info msg="StopPodSandbox for \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\"" May 15 10:05:44.589517 env[1216]: 2025-05-15 10:05:44.548 [WARNING][4699] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"9f5db866-c398-45ad-8a42-5cc212ce1355", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773", Pod:"coredns-6f6b679f8f-2gbhj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali003d6e4caf8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:44.589517 env[1216]: 2025-05-15 10:05:44.548 [INFO][4699] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" May 15 10:05:44.589517 env[1216]: 2025-05-15 10:05:44.548 [INFO][4699] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" iface="eth0" netns="" May 15 10:05:44.589517 env[1216]: 2025-05-15 10:05:44.548 [INFO][4699] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" May 15 10:05:44.589517 env[1216]: 2025-05-15 10:05:44.548 [INFO][4699] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" May 15 10:05:44.589517 env[1216]: 2025-05-15 10:05:44.571 [INFO][4708] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" HandleID="k8s-pod-network.a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" Workload="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" May 15 10:05:44.589517 env[1216]: 2025-05-15 10:05:44.571 [INFO][4708] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:44.589517 env[1216]: 2025-05-15 10:05:44.572 [INFO][4708] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:44.589517 env[1216]: 2025-05-15 10:05:44.583 [WARNING][4708] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" HandleID="k8s-pod-network.a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" Workload="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" May 15 10:05:44.589517 env[1216]: 2025-05-15 10:05:44.583 [INFO][4708] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" HandleID="k8s-pod-network.a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" Workload="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" May 15 10:05:44.589517 env[1216]: 2025-05-15 10:05:44.587 [INFO][4708] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:44.589517 env[1216]: 2025-05-15 10:05:44.588 [INFO][4699] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" May 15 10:05:44.591346 env[1216]: time="2025-05-15T10:05:44.589487077Z" level=info msg="TearDown network for sandbox \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\" successfully" May 15 10:05:44.591582 env[1216]: time="2025-05-15T10:05:44.591343751Z" level=info msg="StopPodSandbox for \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\" returns successfully" May 15 10:05:44.592104 env[1216]: time="2025-05-15T10:05:44.592079845Z" level=info msg="RemovePodSandbox for \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\"" May 15 10:05:44.592247 env[1216]: time="2025-05-15T10:05:44.592209607Z" level=info msg="Forcibly stopping sandbox \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\"" May 15 10:05:44.660788 env[1216]: 2025-05-15 10:05:44.628 [WARNING][4733] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"9f5db866-c398-45ad-8a42-5cc212ce1355", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"40f612cdd0cf255d75cbaa8871af65b7ada5b583f029e8399a0be76003120773", Pod:"coredns-6f6b679f8f-2gbhj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali003d6e4caf8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:44.660788 env[1216]: 2025-05-15 10:05:44.628 [INFO][4733] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" May 15 10:05:44.660788 env[1216]: 2025-05-15 10:05:44.628 [INFO][4733] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" iface="eth0" netns="" May 15 10:05:44.660788 env[1216]: 2025-05-15 10:05:44.628 [INFO][4733] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" May 15 10:05:44.660788 env[1216]: 2025-05-15 10:05:44.628 [INFO][4733] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" May 15 10:05:44.660788 env[1216]: 2025-05-15 10:05:44.647 [INFO][4742] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" HandleID="k8s-pod-network.a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" Workload="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" May 15 10:05:44.660788 env[1216]: 2025-05-15 10:05:44.647 [INFO][4742] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:44.660788 env[1216]: 2025-05-15 10:05:44.647 [INFO][4742] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:44.660788 env[1216]: 2025-05-15 10:05:44.655 [WARNING][4742] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" HandleID="k8s-pod-network.a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" Workload="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" May 15 10:05:44.660788 env[1216]: 2025-05-15 10:05:44.655 [INFO][4742] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" HandleID="k8s-pod-network.a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" Workload="localhost-k8s-coredns--6f6b679f8f--2gbhj-eth0" May 15 10:05:44.660788 env[1216]: 2025-05-15 10:05:44.656 [INFO][4742] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:44.660788 env[1216]: 2025-05-15 10:05:44.659 [INFO][4733] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f" May 15 10:05:44.661289 env[1216]: time="2025-05-15T10:05:44.661244112Z" level=info msg="TearDown network for sandbox \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\" successfully" May 15 10:05:44.663963 env[1216]: time="2025-05-15T10:05:44.663937642Z" level=info msg="RemovePodSandbox \"a985b057276fafbd7e825297d8108f66b118e1aedb69e03f253e24d2f6b0438f\" returns successfully" May 15 10:05:44.664488 env[1216]: time="2025-05-15T10:05:44.664465051Z" level=info msg="StopPodSandbox for \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\"" May 15 10:05:44.733648 env[1216]: 2025-05-15 10:05:44.697 [WARNING][4765] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0", GenerateName:"calico-kube-controllers-85df6c8f48-", Namespace:"calico-system", SelfLink:"", UID:"cfbf95ca-356d-4e86-9b10-1c746b5559fe", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85df6c8f48", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0", Pod:"calico-kube-controllers-85df6c8f48-khsxw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali43129fcc65c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:44.733648 env[1216]: 2025-05-15 10:05:44.697 [INFO][4765] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" May 15 10:05:44.733648 env[1216]: 2025-05-15 10:05:44.697 [INFO][4765] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" iface="eth0" netns="" May 15 10:05:44.733648 env[1216]: 2025-05-15 10:05:44.697 [INFO][4765] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" May 15 10:05:44.733648 env[1216]: 2025-05-15 10:05:44.698 [INFO][4765] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" May 15 10:05:44.733648 env[1216]: 2025-05-15 10:05:44.721 [INFO][4773] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" HandleID="k8s-pod-network.0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" Workload="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" May 15 10:05:44.733648 env[1216]: 2025-05-15 10:05:44.721 [INFO][4773] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:44.733648 env[1216]: 2025-05-15 10:05:44.721 [INFO][4773] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:44.733648 env[1216]: 2025-05-15 10:05:44.729 [WARNING][4773] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" HandleID="k8s-pod-network.0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" Workload="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" May 15 10:05:44.733648 env[1216]: 2025-05-15 10:05:44.729 [INFO][4773] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" HandleID="k8s-pod-network.0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" Workload="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" May 15 10:05:44.733648 env[1216]: 2025-05-15 10:05:44.731 [INFO][4773] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:44.733648 env[1216]: 2025-05-15 10:05:44.732 [INFO][4765] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" May 15 10:05:44.734086 env[1216]: time="2025-05-15T10:05:44.733679080Z" level=info msg="TearDown network for sandbox \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\" successfully" May 15 10:05:44.734086 env[1216]: time="2025-05-15T10:05:44.733709081Z" level=info msg="StopPodSandbox for \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\" returns successfully" May 15 10:05:44.734529 env[1216]: time="2025-05-15T10:05:44.734492855Z" level=info msg="RemovePodSandbox for \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\"" May 15 10:05:44.734598 env[1216]: time="2025-05-15T10:05:44.734541816Z" level=info msg="Forcibly stopping sandbox \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\"" May 15 10:05:44.807634 env[1216]: 2025-05-15 10:05:44.773 [WARNING][4795] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0", GenerateName:"calico-kube-controllers-85df6c8f48-", Namespace:"calico-system", SelfLink:"", UID:"cfbf95ca-356d-4e86-9b10-1c746b5559fe", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85df6c8f48", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"89377c2637e62af3b90b48f5134e70610809add8528b8e5c9d7a7fb36eeb46f0", Pod:"calico-kube-controllers-85df6c8f48-khsxw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali43129fcc65c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:44.807634 env[1216]: 2025-05-15 10:05:44.773 [INFO][4795] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" May 15 10:05:44.807634 env[1216]: 2025-05-15 10:05:44.773 [INFO][4795] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" iface="eth0" netns="" May 15 10:05:44.807634 env[1216]: 2025-05-15 10:05:44.773 [INFO][4795] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" May 15 10:05:44.807634 env[1216]: 2025-05-15 10:05:44.773 [INFO][4795] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" May 15 10:05:44.807634 env[1216]: 2025-05-15 10:05:44.794 [INFO][4804] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" HandleID="k8s-pod-network.0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" Workload="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" May 15 10:05:44.807634 env[1216]: 2025-05-15 10:05:44.794 [INFO][4804] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:44.807634 env[1216]: 2025-05-15 10:05:44.794 [INFO][4804] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:44.807634 env[1216]: 2025-05-15 10:05:44.802 [WARNING][4804] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" HandleID="k8s-pod-network.0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" Workload="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" May 15 10:05:44.807634 env[1216]: 2025-05-15 10:05:44.802 [INFO][4804] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" HandleID="k8s-pod-network.0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" Workload="localhost-k8s-calico--kube--controllers--85df6c8f48--khsxw-eth0" May 15 10:05:44.807634 env[1216]: 2025-05-15 10:05:44.803 [INFO][4804] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:44.807634 env[1216]: 2025-05-15 10:05:44.805 [INFO][4795] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10" May 15 10:05:44.808058 env[1216]: time="2025-05-15T10:05:44.807684196Z" level=info msg="TearDown network for sandbox \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\" successfully" May 15 10:05:44.811313 env[1216]: time="2025-05-15T10:05:44.811234261Z" level=info msg="RemovePodSandbox \"0abb0d43df204e66f989b4880d5bf7d7be5f7b333c5e94f8c8cfd499ee548c10\" returns successfully" May 15 10:05:44.811912 env[1216]: time="2025-05-15T10:05:44.811890634Z" level=info msg="StopPodSandbox for \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\"" May 15 10:05:44.891311 env[1216]: 2025-05-15 10:05:44.857 [WARNING][4827] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"5ca3009b-464d-4ecc-b330-d9060256ea98", ResourceVersion:"878", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42", Pod:"coredns-6f6b679f8f-5pxzd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0527a3f4b02", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:44.891311 env[1216]: 2025-05-15 10:05:44.858 [INFO][4827] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" May 15 10:05:44.891311 env[1216]: 2025-05-15 10:05:44.858 [INFO][4827] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" iface="eth0" netns="" May 15 10:05:44.891311 env[1216]: 2025-05-15 10:05:44.858 [INFO][4827] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" May 15 10:05:44.891311 env[1216]: 2025-05-15 10:05:44.858 [INFO][4827] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" May 15 10:05:44.891311 env[1216]: 2025-05-15 10:05:44.875 [INFO][4835] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" HandleID="k8s-pod-network.d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" Workload="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" May 15 10:05:44.891311 env[1216]: 2025-05-15 10:05:44.875 [INFO][4835] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:44.891311 env[1216]: 2025-05-15 10:05:44.875 [INFO][4835] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:44.891311 env[1216]: 2025-05-15 10:05:44.886 [WARNING][4835] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" HandleID="k8s-pod-network.d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" Workload="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" May 15 10:05:44.891311 env[1216]: 2025-05-15 10:05:44.886 [INFO][4835] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" HandleID="k8s-pod-network.d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" Workload="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" May 15 10:05:44.891311 env[1216]: 2025-05-15 10:05:44.887 [INFO][4835] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:44.891311 env[1216]: 2025-05-15 10:05:44.888 [INFO][4827] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" May 15 10:05:44.891798 env[1216]: time="2025-05-15T10:05:44.891765258Z" level=info msg="TearDown network for sandbox \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\" successfully" May 15 10:05:44.891862 env[1216]: time="2025-05-15T10:05:44.891848099Z" level=info msg="StopPodSandbox for \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\" returns successfully" May 15 10:05:44.892375 env[1216]: time="2025-05-15T10:05:44.892352428Z" level=info msg="RemovePodSandbox for \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\"" May 15 10:05:44.892593 env[1216]: time="2025-05-15T10:05:44.892557032Z" level=info msg="Forcibly stopping sandbox \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\"" May 15 10:05:44.957713 env[1216]: 2025-05-15 10:05:44.923 [WARNING][4859] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"5ca3009b-464d-4ecc-b330-d9060256ea98", ResourceVersion:"878", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"36f5dbddefffd562bdf2efebbd0a23f55befa3869941a203006e413d4e313b42", Pod:"coredns-6f6b679f8f-5pxzd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0527a3f4b02", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:44.957713 env[1216]: 2025-05-15 10:05:44.923 [INFO][4859] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" May 15 10:05:44.957713 env[1216]: 2025-05-15 10:05:44.923 [INFO][4859] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" iface="eth0" netns="" May 15 10:05:44.957713 env[1216]: 2025-05-15 10:05:44.923 [INFO][4859] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" May 15 10:05:44.957713 env[1216]: 2025-05-15 10:05:44.923 [INFO][4859] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" May 15 10:05:44.957713 env[1216]: 2025-05-15 10:05:44.941 [INFO][4868] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" HandleID="k8s-pod-network.d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" Workload="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" May 15 10:05:44.957713 env[1216]: 2025-05-15 10:05:44.941 [INFO][4868] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:44.957713 env[1216]: 2025-05-15 10:05:44.942 [INFO][4868] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:44.957713 env[1216]: 2025-05-15 10:05:44.949 [WARNING][4868] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" HandleID="k8s-pod-network.d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" Workload="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" May 15 10:05:44.957713 env[1216]: 2025-05-15 10:05:44.949 [INFO][4868] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" HandleID="k8s-pod-network.d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" Workload="localhost-k8s-coredns--6f6b679f8f--5pxzd-eth0" May 15 10:05:44.957713 env[1216]: 2025-05-15 10:05:44.951 [INFO][4868] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:44.957713 env[1216]: 2025-05-15 10:05:44.952 [INFO][4859] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20" May 15 10:05:44.958204 env[1216]: time="2025-05-15T10:05:44.958164715Z" level=info msg="TearDown network for sandbox \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\" successfully" May 15 10:05:44.961245 env[1216]: time="2025-05-15T10:05:44.961209930Z" level=info msg="RemovePodSandbox \"d4249c7d82506f1709eed3a7a3badffa08c5871e95954e1cba300b37f02f1a20\" returns successfully" May 15 10:05:44.961839 env[1216]: time="2025-05-15T10:05:44.961810821Z" level=info msg="StopPodSandbox for \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\"" May 15 10:05:45.033199 env[1216]: 2025-05-15 10:05:44.994 [WARNING][4891] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0", GenerateName:"calico-apiserver-544995c86d-", Namespace:"calico-apiserver", SelfLink:"", UID:"7f1f243b-eb57-4aa3-b0c4-594c99e3933a", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"544995c86d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155", Pod:"calico-apiserver-544995c86d-8l9dj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calieee0facc94b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:45.033199 env[1216]: 2025-05-15 10:05:44.994 [INFO][4891] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" May 15 10:05:45.033199 env[1216]: 2025-05-15 10:05:44.994 [INFO][4891] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" iface="eth0" netns="" May 15 10:05:45.033199 env[1216]: 2025-05-15 10:05:44.994 [INFO][4891] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" May 15 10:05:45.033199 env[1216]: 2025-05-15 10:05:44.994 [INFO][4891] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" May 15 10:05:45.033199 env[1216]: 2025-05-15 10:05:45.014 [INFO][4899] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" HandleID="k8s-pod-network.23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" Workload="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" May 15 10:05:45.033199 env[1216]: 2025-05-15 10:05:45.014 [INFO][4899] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:45.033199 env[1216]: 2025-05-15 10:05:45.014 [INFO][4899] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:45.033199 env[1216]: 2025-05-15 10:05:45.027 [WARNING][4899] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" HandleID="k8s-pod-network.23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" Workload="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" May 15 10:05:45.033199 env[1216]: 2025-05-15 10:05:45.027 [INFO][4899] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" HandleID="k8s-pod-network.23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" Workload="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" May 15 10:05:45.033199 env[1216]: 2025-05-15 10:05:45.030 [INFO][4899] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:45.033199 env[1216]: 2025-05-15 10:05:45.031 [INFO][4891] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" May 15 10:05:45.033758 env[1216]: time="2025-05-15T10:05:45.033722014Z" level=info msg="TearDown network for sandbox \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\" successfully" May 15 10:05:45.033825 env[1216]: time="2025-05-15T10:05:45.033810376Z" level=info msg="StopPodSandbox for \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\" returns successfully" May 15 10:05:45.034301 env[1216]: time="2025-05-15T10:05:45.034266224Z" level=info msg="RemovePodSandbox for \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\"" May 15 10:05:45.034437 env[1216]: time="2025-05-15T10:05:45.034399747Z" level=info msg="Forcibly stopping sandbox \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\"" May 15 10:05:45.114829 env[1216]: 2025-05-15 10:05:45.073 [WARNING][4920] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0", GenerateName:"calico-apiserver-544995c86d-", Namespace:"calico-apiserver", SelfLink:"", UID:"7f1f243b-eb57-4aa3-b0c4-594c99e3933a", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"544995c86d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c851821553e4f012968490e05381e9ddc90c7a70f3998248e4b3ad3882c92155", Pod:"calico-apiserver-544995c86d-8l9dj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calieee0facc94b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:45.114829 env[1216]: 2025-05-15 10:05:45.074 [INFO][4920] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" May 15 10:05:45.114829 env[1216]: 2025-05-15 10:05:45.074 [INFO][4920] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" iface="eth0" netns="" May 15 10:05:45.114829 env[1216]: 2025-05-15 10:05:45.074 [INFO][4920] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" May 15 10:05:45.114829 env[1216]: 2025-05-15 10:05:45.074 [INFO][4920] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" May 15 10:05:45.114829 env[1216]: 2025-05-15 10:05:45.100 [INFO][4929] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" HandleID="k8s-pod-network.23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" Workload="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" May 15 10:05:45.114829 env[1216]: 2025-05-15 10:05:45.100 [INFO][4929] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:45.114829 env[1216]: 2025-05-15 10:05:45.100 [INFO][4929] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:45.114829 env[1216]: 2025-05-15 10:05:45.109 [WARNING][4929] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" HandleID="k8s-pod-network.23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" Workload="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" May 15 10:05:45.114829 env[1216]: 2025-05-15 10:05:45.109 [INFO][4929] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" HandleID="k8s-pod-network.23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" Workload="localhost-k8s-calico--apiserver--544995c86d--8l9dj-eth0" May 15 10:05:45.114829 env[1216]: 2025-05-15 10:05:45.111 [INFO][4929] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:45.114829 env[1216]: 2025-05-15 10:05:45.113 [INFO][4920] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f" May 15 10:05:45.115375 env[1216]: time="2025-05-15T10:05:45.115340378Z" level=info msg="TearDown network for sandbox \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\" successfully" May 15 10:05:45.119238 env[1216]: time="2025-05-15T10:05:45.119201208Z" level=info msg="RemovePodSandbox \"23dca3934f6847a2c058843aaa6c70f294ff28a47ad510a8132867c07422a82f\" returns successfully" May 15 10:05:45.120023 env[1216]: time="2025-05-15T10:05:45.119995782Z" level=info msg="StopPodSandbox for \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\"" May 15 10:05:45.197869 env[1216]: 2025-05-15 10:05:45.155 [WARNING][4952] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--8v6wf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b24f406a-f736-4264-9766-c83335e6676c", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2", Pod:"csi-node-driver-8v6wf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3f6e261f7d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:45.197869 env[1216]: 2025-05-15 10:05:45.155 [INFO][4952] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" May 15 10:05:45.197869 env[1216]: 2025-05-15 10:05:45.155 [INFO][4952] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" iface="eth0" netns="" May 15 10:05:45.197869 env[1216]: 2025-05-15 10:05:45.155 [INFO][4952] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" May 15 10:05:45.197869 env[1216]: 2025-05-15 10:05:45.155 [INFO][4952] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" May 15 10:05:45.197869 env[1216]: 2025-05-15 10:05:45.185 [INFO][4960] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" HandleID="k8s-pod-network.24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" Workload="localhost-k8s-csi--node--driver--8v6wf-eth0" May 15 10:05:45.197869 env[1216]: 2025-05-15 10:05:45.185 [INFO][4960] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:45.197869 env[1216]: 2025-05-15 10:05:45.185 [INFO][4960] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:45.197869 env[1216]: 2025-05-15 10:05:45.193 [WARNING][4960] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" HandleID="k8s-pod-network.24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" Workload="localhost-k8s-csi--node--driver--8v6wf-eth0" May 15 10:05:45.197869 env[1216]: 2025-05-15 10:05:45.193 [INFO][4960] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" HandleID="k8s-pod-network.24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" Workload="localhost-k8s-csi--node--driver--8v6wf-eth0" May 15 10:05:45.197869 env[1216]: 2025-05-15 10:05:45.195 [INFO][4960] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:45.197869 env[1216]: 2025-05-15 10:05:45.196 [INFO][4952] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" May 15 10:05:45.198391 env[1216]: time="2025-05-15T10:05:45.198357847Z" level=info msg="TearDown network for sandbox \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\" successfully" May 15 10:05:45.198459 env[1216]: time="2025-05-15T10:05:45.198444488Z" level=info msg="StopPodSandbox for \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\" returns successfully" May 15 10:05:45.200436 env[1216]: time="2025-05-15T10:05:45.200389884Z" level=info msg="RemovePodSandbox for \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\"" May 15 10:05:45.200524 env[1216]: time="2025-05-15T10:05:45.200440004Z" level=info msg="Forcibly stopping sandbox \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\"" May 15 10:05:45.299000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:05:45.299000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:05:45.299000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001e3c7a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 key=(null) May 15 10:05:45.299000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000985d00 a2=fc6 a3=0 items=0 ppid=1669 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 key=(null) May 15 10:05:45.299000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:05:45.299000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:05:45.299000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000985d20 a2=fc6 a3=0 items=0 ppid=1669 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 key=(null) May 15 10:05:45.299000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:05:45.299000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:05:45.299000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000985d60 a2=fc6 a3=0 items=0 ppid=1669 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c445,c556 key=(null) May 15 10:05:45.299000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:05:45.299000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:05:45.347758 env[1216]: 2025-05-15 10:05:45.253 [WARNING][4984] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--8v6wf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b24f406a-f736-4264-9766-c83335e6676c", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 4, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"76e28dadde4cd3cfcf5334f66808c41ee5d92715d9fd1a51892bbe98fea558a2", Pod:"csi-node-driver-8v6wf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3f6e261f7d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:05:45.347758 env[1216]: 2025-05-15 10:05:45.253 [INFO][4984] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" May 15 10:05:45.347758 env[1216]: 2025-05-15 10:05:45.253 [INFO][4984] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" iface="eth0" netns="" May 15 10:05:45.347758 env[1216]: 2025-05-15 10:05:45.253 [INFO][4984] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" May 15 10:05:45.347758 env[1216]: 2025-05-15 10:05:45.253 [INFO][4984] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" May 15 10:05:45.347758 env[1216]: 2025-05-15 10:05:45.277 [INFO][4994] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" HandleID="k8s-pod-network.24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" Workload="localhost-k8s-csi--node--driver--8v6wf-eth0" May 15 10:05:45.347758 env[1216]: 2025-05-15 10:05:45.277 [INFO][4994] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:05:45.347758 env[1216]: 2025-05-15 10:05:45.277 [INFO][4994] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:05:45.347758 env[1216]: 2025-05-15 10:05:45.335 [WARNING][4994] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" HandleID="k8s-pod-network.24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" Workload="localhost-k8s-csi--node--driver--8v6wf-eth0" May 15 10:05:45.347758 env[1216]: 2025-05-15 10:05:45.335 [INFO][4994] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" HandleID="k8s-pod-network.24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" Workload="localhost-k8s-csi--node--driver--8v6wf-eth0" May 15 10:05:45.347758 env[1216]: 2025-05-15 10:05:45.342 [INFO][4994] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:05:45.347758 env[1216]: 2025-05-15 10:05:45.346 [INFO][4984] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f" May 15 10:05:45.348488 env[1216]: time="2025-05-15T10:05:45.348454575Z" level=info msg="TearDown network for sandbox \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\" successfully" May 15 10:05:45.371830 env[1216]: time="2025-05-15T10:05:45.371780758Z" level=info msg="RemovePodSandbox \"24e1ce67ee5b4a38721446a0f16a96d3028288261be166296246b58cbaf6478f\" returns successfully" May 15 10:05:47.170693 systemd[1]: Started sshd@15-10.0.0.18:22-10.0.0.1:36624.service. May 15 10:05:47.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.18:22-10.0.0.1:36624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:47.171756 kernel: kauditd_printk_skb: 13 callbacks suppressed May 15 10:05:47.171818 kernel: audit: type=1130 audit(1747303547.169:1407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.18:22-10.0.0.1:36624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:47.211000 audit[5003]: USER_ACCT pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.215506 sshd[5003]: Accepted publickey for core from 10.0.0.1 port 36624 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:05:47.219549 kernel: audit: type=1101 audit(1747303547.211:1408): pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.219000 audit[5003]: CRED_ACQ pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.222987 sshd[5003]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:05:47.224308 kernel: audit: type=1103 audit(1747303547.219:1409): pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.224551 kernel: audit: type=1006 audit(1747303547.219:1410): pid=5003 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 15 10:05:47.224587 kernel: audit: type=1300 audit(1747303547.219:1410): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd24c4110 a2=3 a3=1 items=0 ppid=1 pid=5003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:47.219000 audit[5003]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd24c4110 a2=3 a3=1 items=0 ppid=1 pid=5003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:47.219000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:05:47.227784 kernel: audit: type=1327 audit(1747303547.219:1410): proctitle=737368643A20636F7265205B707269765D May 15 10:05:47.227362 systemd-logind[1208]: New session 16 of user core. May 15 10:05:47.228215 systemd[1]: Started session-16.scope. May 15 10:05:47.230000 audit[5003]: USER_START pid=5003 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.232000 audit[5005]: CRED_ACQ pid=5005 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.237451 kernel: audit: type=1105 audit(1747303547.230:1411): pid=5003 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.237487 kernel: audit: type=1103 audit(1747303547.232:1412): pid=5005 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.379233 sshd[5003]: pam_unix(sshd:session): session closed for user core May 15 10:05:47.381000 audit[5003]: USER_END pid=5003 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.383650 systemd[1]: Started sshd@16-10.0.0.18:22-10.0.0.1:36630.service. May 15 10:05:47.384152 systemd[1]: sshd@15-10.0.0.18:22-10.0.0.1:36624.service: Deactivated successfully. May 15 10:05:47.384910 systemd[1]: session-16.scope: Deactivated successfully. May 15 10:05:47.381000 audit[5003]: CRED_DISP pid=5003 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.388607 kernel: audit: type=1106 audit(1747303547.381:1413): pid=5003 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.388660 kernel: audit: type=1104 audit(1747303547.381:1414): pid=5003 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.18:22-10.0.0.1:36630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:47.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.18:22-10.0.0.1:36624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:47.389119 systemd-logind[1208]: Session 16 logged out. Waiting for processes to exit. May 15 10:05:47.389837 systemd-logind[1208]: Removed session 16. May 15 10:05:47.415000 audit[5015]: USER_ACCT pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.417675 sshd[5015]: Accepted publickey for core from 10.0.0.1 port 36630 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:05:47.416000 audit[5015]: CRED_ACQ pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.416000 audit[5015]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe261c940 a2=3 a3=1 items=0 ppid=1 pid=5015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:47.416000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:05:47.418237 sshd[5015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:05:47.421259 systemd-logind[1208]: New session 17 of user core. May 15 10:05:47.422058 systemd[1]: Started session-17.scope. May 15 10:05:47.424000 audit[5015]: USER_START pid=5015 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.425000 audit[5018]: CRED_ACQ pid=5018 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.632695 sshd[5015]: pam_unix(sshd:session): session closed for user core May 15 10:05:47.632000 audit[5015]: USER_END pid=5015 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.632000 audit[5015]: CRED_DISP pid=5015 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.636089 systemd[1]: Started sshd@17-10.0.0.18:22-10.0.0.1:36644.service. May 15 10:05:47.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.18:22-10.0.0.1:36644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:47.637838 systemd[1]: sshd@16-10.0.0.18:22-10.0.0.1:36630.service: Deactivated successfully. May 15 10:05:47.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.18:22-10.0.0.1:36630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:47.638629 systemd[1]: session-17.scope: Deactivated successfully. May 15 10:05:47.639233 systemd-logind[1208]: Session 17 logged out. Waiting for processes to exit. May 15 10:05:47.639985 systemd-logind[1208]: Removed session 17. May 15 10:05:47.671000 audit[5026]: USER_ACCT pid=5026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.672818 sshd[5026]: Accepted publickey for core from 10.0.0.1 port 36644 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:05:47.672000 audit[5026]: CRED_ACQ pid=5026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.672000 audit[5026]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc90bc540 a2=3 a3=1 items=0 ppid=1 pid=5026 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:47.672000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:05:47.674191 sshd[5026]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:05:47.678269 systemd-logind[1208]: New session 18 of user core. May 15 10:05:47.678745 systemd[1]: Started session-18.scope. May 15 10:05:47.681000 audit[5026]: USER_START pid=5026 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:47.683000 audit[5029]: CRED_ACQ pid=5029 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:49.194000 audit[5044]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:49.194000 audit[5044]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffebc896a0 a2=0 a3=1 items=0 ppid=2126 pid=5044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:49.194000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:49.203289 sshd[5026]: pam_unix(sshd:session): session closed for user core May 15 10:05:49.203000 audit[5026]: USER_END pid=5026 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:49.203000 audit[5026]: CRED_DISP pid=5026 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:49.205000 audit[5044]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:49.205000 audit[5044]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffebc896a0 a2=0 a3=1 items=0 ppid=2126 pid=5044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:49.205000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:49.206996 systemd[1]: Started sshd@18-10.0.0.18:22-10.0.0.1:36656.service. May 15 10:05:49.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.18:22-10.0.0.1:36656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:49.209466 systemd[1]: sshd@17-10.0.0.18:22-10.0.0.1:36644.service: Deactivated successfully. May 15 10:05:49.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.18:22-10.0.0.1:36644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:49.210130 systemd[1]: session-18.scope: Deactivated successfully. May 15 10:05:49.210727 systemd-logind[1208]: Session 18 logged out. Waiting for processes to exit. May 15 10:05:49.211690 systemd-logind[1208]: Removed session 18. May 15 10:05:49.224000 audit[5050]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=5050 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:49.224000 audit[5050]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffe9793f90 a2=0 a3=1 items=0 ppid=2126 pid=5050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:49.224000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:49.228000 audit[5050]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5050 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:49.228000 audit[5050]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe9793f90 a2=0 a3=1 items=0 ppid=2126 pid=5050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:49.228000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:49.242734 sshd[5046]: Accepted publickey for core from 10.0.0.1 port 36656 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:05:49.241000 audit[5046]: USER_ACCT pid=5046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:49.244105 sshd[5046]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:05:49.242000 audit[5046]: CRED_ACQ pid=5046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:49.242000 audit[5046]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff50a34f0 a2=3 a3=1 items=0 ppid=1 pid=5046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:49.242000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:05:49.247817 systemd-logind[1208]: New session 19 of user core. May 15 10:05:49.248235 systemd[1]: Started session-19.scope. May 15 10:05:49.251000 audit[5046]: USER_START pid=5046 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:49.252000 audit[5051]: CRED_ACQ pid=5051 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:49.556279 sshd[5046]: pam_unix(sshd:session): session closed for user core May 15 10:05:49.556000 audit[5046]: USER_END pid=5046 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:49.557000 audit[5046]: CRED_DISP pid=5046 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:49.560027 systemd[1]: Started sshd@19-10.0.0.18:22-10.0.0.1:36658.service. May 15 10:05:49.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.18:22-10.0.0.1:36658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:49.561304 systemd[1]: sshd@18-10.0.0.18:22-10.0.0.1:36656.service: Deactivated successfully. May 15 10:05:49.562155 systemd[1]: session-19.scope: Deactivated successfully. May 15 10:05:49.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.18:22-10.0.0.1:36656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:49.562778 systemd-logind[1208]: Session 19 logged out. Waiting for processes to exit. May 15 10:05:49.563721 systemd-logind[1208]: Removed session 19. May 15 10:05:49.593000 audit[5060]: USER_ACCT pid=5060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:49.595428 sshd[5060]: Accepted publickey for core from 10.0.0.1 port 36658 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:05:49.595000 audit[5060]: CRED_ACQ pid=5060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:49.595000 audit[5060]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdcb12680 a2=3 a3=1 items=0 ppid=1 pid=5060 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:49.595000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:05:49.597057 sshd[5060]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:05:49.600773 systemd-logind[1208]: New session 20 of user core. May 15 10:05:49.601666 systemd[1]: Started session-20.scope. May 15 10:05:49.604000 audit[5060]: USER_START pid=5060 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:49.606000 audit[5063]: CRED_ACQ pid=5063 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:49.719606 sshd[5060]: pam_unix(sshd:session): session closed for user core May 15 10:05:49.719000 audit[5060]: USER_END pid=5060 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:49.719000 audit[5060]: CRED_DISP pid=5060 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:49.722785 systemd[1]: sshd@19-10.0.0.18:22-10.0.0.1:36658.service: Deactivated successfully. May 15 10:05:49.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.18:22-10.0.0.1:36658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:49.723549 systemd[1]: session-20.scope: Deactivated successfully. May 15 10:05:49.724110 systemd-logind[1208]: Session 20 logged out. Waiting for processes to exit. May 15 10:05:49.724918 systemd-logind[1208]: Removed session 20. May 15 10:05:54.216288 kernel: kauditd_printk_skb: 57 callbacks suppressed May 15 10:05:54.216430 kernel: audit: type=1325 audit(1747303554.213:1456): table=filter:125 family=2 entries=20 op=nft_register_rule pid=5084 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:54.213000 audit[5084]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5084 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:54.213000 audit[5084]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffdfaa5c40 a2=0 a3=1 items=0 ppid=2126 pid=5084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:54.219816 kernel: audit: type=1300 audit(1747303554.213:1456): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffdfaa5c40 a2=0 a3=1 items=0 ppid=2126 pid=5084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:54.219878 kernel: audit: type=1327 audit(1747303554.213:1456): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:54.213000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:54.225000 audit[5084]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=5084 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:54.225000 audit[5084]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffdfaa5c40 a2=0 a3=1 items=0 ppid=2126 pid=5084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:54.231544 kernel: audit: type=1325 audit(1747303554.225:1457): table=nat:126 family=2 entries=106 op=nft_register_chain pid=5084 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:05:54.231620 kernel: audit: type=1300 audit(1747303554.225:1457): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffdfaa5c40 a2=0 a3=1 items=0 ppid=2126 pid=5084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:54.231646 kernel: audit: type=1327 audit(1747303554.225:1457): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:54.225000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:05:54.723730 systemd[1]: Started sshd@20-10.0.0.18:22-10.0.0.1:60374.service. May 15 10:05:54.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.18:22-10.0.0.1:60374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:54.726274 kernel: audit: type=1130 audit(1747303554.722:1458): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.18:22-10.0.0.1:60374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:54.760000 audit[5087]: USER_ACCT pid=5087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:54.761696 sshd[5087]: Accepted publickey for core from 10.0.0.1 port 60374 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:05:54.763334 sshd[5087]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:05:54.761000 audit[5087]: CRED_ACQ pid=5087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:54.766353 kernel: audit: type=1101 audit(1747303554.760:1459): pid=5087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:54.766433 kernel: audit: type=1103 audit(1747303554.761:1460): pid=5087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:54.768018 kernel: audit: type=1006 audit(1747303554.761:1461): pid=5087 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 15 10:05:54.761000 audit[5087]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffca06e940 a2=3 a3=1 items=0 ppid=1 pid=5087 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:54.761000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:05:54.773396 systemd-logind[1208]: New session 21 of user core. May 15 10:05:54.774377 systemd[1]: Started session-21.scope. May 15 10:05:54.789000 audit[5087]: USER_START pid=5087 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:54.790000 audit[5089]: CRED_ACQ pid=5089 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:54.910280 sshd[5087]: pam_unix(sshd:session): session closed for user core May 15 10:05:54.910000 audit[5087]: USER_END pid=5087 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:54.910000 audit[5087]: CRED_DISP pid=5087 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:54.913049 systemd[1]: sshd@20-10.0.0.18:22-10.0.0.1:60374.service: Deactivated successfully. May 15 10:05:54.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.18:22-10.0.0.1:60374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:54.913836 systemd[1]: session-21.scope: Deactivated successfully. May 15 10:05:54.914461 systemd-logind[1208]: Session 21 logged out. Waiting for processes to exit. May 15 10:05:54.915344 systemd-logind[1208]: Removed session 21. May 15 10:05:55.304233 kubelet[1951]: E0515 10:05:55.304188 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:58.305072 kubelet[1951]: E0515 10:05:58.305035 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:05:59.915046 systemd[1]: Started sshd@21-10.0.0.18:22-10.0.0.1:60390.service. May 15 10:05:59.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.18:22-10.0.0.1:60390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:59.916562 kernel: kauditd_printk_skb: 7 callbacks suppressed May 15 10:05:59.916620 kernel: audit: type=1130 audit(1747303559.913:1467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.18:22-10.0.0.1:60390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:05:59.953000 audit[5100]: USER_ACCT pid=5100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:59.955457 sshd[5100]: Accepted publickey for core from 10.0.0.1 port 60390 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:05:59.956821 sshd[5100]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:05:59.954000 audit[5100]: CRED_ACQ pid=5100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:59.959766 kernel: audit: type=1101 audit(1747303559.953:1468): pid=5100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:59.959826 kernel: audit: type=1103 audit(1747303559.954:1469): pid=5100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:59.961613 kernel: audit: type=1006 audit(1747303559.954:1470): pid=5100 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 15 10:05:59.961652 kernel: audit: type=1300 audit(1747303559.954:1470): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc945400 a2=3 a3=1 items=0 ppid=1 pid=5100 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:59.954000 audit[5100]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc945400 a2=3 a3=1 items=0 ppid=1 pid=5100 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:05:59.964185 kernel: audit: type=1327 audit(1747303559.954:1470): proctitle=737368643A20636F7265205B707269765D May 15 10:05:59.954000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:05:59.967989 systemd-logind[1208]: New session 22 of user core. May 15 10:05:59.968563 systemd[1]: Started session-22.scope. May 15 10:05:59.979000 audit[5100]: USER_START pid=5100 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:59.984294 kernel: audit: type=1105 audit(1747303559.979:1471): pid=5100 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:59.984371 kernel: audit: type=1103 audit(1747303559.983:1472): pid=5102 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:05:59.983000 audit[5102]: CRED_ACQ pid=5102 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:00.096930 sshd[5100]: pam_unix(sshd:session): session closed for user core May 15 10:06:00.097000 audit[5100]: USER_END pid=5100 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:00.098000 audit[5100]: CRED_DISP pid=5100 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:00.104462 kernel: audit: type=1106 audit(1747303560.097:1473): pid=5100 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:00.104526 kernel: audit: type=1104 audit(1747303560.098:1474): pid=5100 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:00.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.18:22-10.0.0.1:60390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:06:00.103800 systemd-logind[1208]: Session 22 logged out. Waiting for processes to exit. May 15 10:06:00.103902 systemd[1]: sshd@21-10.0.0.18:22-10.0.0.1:60390.service: Deactivated successfully. May 15 10:06:00.104667 systemd[1]: session-22.scope: Deactivated successfully. May 15 10:06:00.105416 systemd-logind[1208]: Removed session 22. May 15 10:06:02.306681 kubelet[1951]: E0515 10:06:02.306180 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:06:05.102538 systemd[1]: Started sshd@22-10.0.0.18:22-10.0.0.1:46408.service. May 15 10:06:05.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.18:22-10.0.0.1:46408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:06:05.103289 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:06:05.103343 kernel: audit: type=1130 audit(1747303565.101:1476): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.18:22-10.0.0.1:46408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:06:05.133000 audit[5116]: USER_ACCT pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:05.135383 sshd[5116]: Accepted publickey for core from 10.0.0.1 port 46408 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:06:05.136925 sshd[5116]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:06:05.135000 audit[5116]: CRED_ACQ pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:05.139827 kernel: audit: type=1101 audit(1747303565.133:1477): pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:05.139876 kernel: audit: type=1103 audit(1747303565.135:1478): pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:05.139893 kernel: audit: type=1006 audit(1747303565.135:1479): pid=5116 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 15 10:06:05.135000 audit[5116]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffedd8650 a2=3 a3=1 items=0 ppid=1 pid=5116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:06:05.143150 systemd-logind[1208]: New session 23 of user core. May 15 10:06:05.143657 kernel: audit: type=1300 audit(1747303565.135:1479): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffedd8650 a2=3 a3=1 items=0 ppid=1 pid=5116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:06:05.143678 kernel: audit: type=1327 audit(1747303565.135:1479): proctitle=737368643A20636F7265205B707269765D May 15 10:06:05.135000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:06:05.144036 systemd[1]: Started session-23.scope. May 15 10:06:05.146000 audit[5116]: USER_START pid=5116 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:05.147000 audit[5118]: CRED_ACQ pid=5118 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:05.152249 kernel: audit: type=1105 audit(1747303565.146:1480): pid=5116 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:05.152303 kernel: audit: type=1103 audit(1747303565.147:1481): pid=5118 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:05.249194 sshd[5116]: pam_unix(sshd:session): session closed for user core May 15 10:06:05.248000 audit[5116]: USER_END pid=5116 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:05.251664 systemd[1]: sshd@22-10.0.0.18:22-10.0.0.1:46408.service: Deactivated successfully. May 15 10:06:05.252448 systemd[1]: session-23.scope: Deactivated successfully. May 15 10:06:05.249000 audit[5116]: CRED_DISP pid=5116 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:05.253009 systemd-logind[1208]: Session 23 logged out. Waiting for processes to exit. May 15 10:06:05.253715 systemd-logind[1208]: Removed session 23. May 15 10:06:05.254939 kernel: audit: type=1106 audit(1747303565.248:1482): pid=5116 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:05.254993 kernel: audit: type=1104 audit(1747303565.249:1483): pid=5116 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:05.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.18:22-10.0.0.1:46408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:06:07.818925 systemd[1]: run-containerd-runc-k8s.io-e00c94fe601a57c49706cbbb1ed7340a8e9fb855475256fedb861960e43c4fda-runc.y3t6pw.mount: Deactivated successfully. May 15 10:06:10.254165 systemd[1]: Started sshd@23-10.0.0.18:22-10.0.0.1:46420.service. May 15 10:06:10.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.18:22-10.0.0.1:46420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:06:10.257213 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:06:10.257278 kernel: audit: type=1130 audit(1747303570.253:1485): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.18:22-10.0.0.1:46420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:06:10.290000 audit[5172]: USER_ACCT pid=5172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:10.292170 sshd[5172]: Accepted publickey for core from 10.0.0.1 port 46420 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:06:10.293543 sshd[5172]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:06:10.291000 audit[5172]: CRED_ACQ pid=5172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:10.296491 kernel: audit: type=1101 audit(1747303570.290:1486): pid=5172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:10.296541 kernel: audit: type=1103 audit(1747303570.291:1487): pid=5172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:10.296602 kernel: audit: type=1006 audit(1747303570.291:1488): pid=5172 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 15 10:06:10.296942 systemd-logind[1208]: New session 24 of user core. May 15 10:06:10.297813 systemd[1]: Started session-24.scope. May 15 10:06:10.297960 kernel: audit: type=1300 audit(1747303570.291:1488): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb37aa50 a2=3 a3=1 items=0 ppid=1 pid=5172 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:06:10.291000 audit[5172]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb37aa50 a2=3 a3=1 items=0 ppid=1 pid=5172 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:06:10.291000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:06:10.299000 audit[5172]: USER_START pid=5172 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:10.303871 kernel: audit: type=1327 audit(1747303570.291:1488): proctitle=737368643A20636F7265205B707269765D May 15 10:06:10.303936 kernel: audit: type=1105 audit(1747303570.299:1489): pid=5172 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:10.303958 kernel: audit: type=1103 audit(1747303570.301:1490): pid=5174 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:10.301000 audit[5174]: CRED_ACQ pid=5174 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:10.407670 sshd[5172]: pam_unix(sshd:session): session closed for user core May 15 10:06:10.407000 audit[5172]: USER_END pid=5172 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:10.410135 systemd[1]: sshd@23-10.0.0.18:22-10.0.0.1:46420.service: Deactivated successfully. May 15 10:06:10.410897 systemd[1]: session-24.scope: Deactivated successfully. May 15 10:06:10.407000 audit[5172]: CRED_DISP pid=5172 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:10.411407 systemd-logind[1208]: Session 24 logged out. Waiting for processes to exit. May 15 10:06:10.412086 systemd-logind[1208]: Removed session 24. May 15 10:06:10.413283 kernel: audit: type=1106 audit(1747303570.407:1491): pid=5172 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:10.413330 kernel: audit: type=1104 audit(1747303570.407:1492): pid=5172 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:06:10.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.18:22-10.0.0.1:46420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:06:11.305069 kubelet[1951]: E0515 10:06:11.304970 1951 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"