May 15 10:20:52.723555 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 15 10:20:52.723575 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Thu May 15 09:09:56 -00 2025 May 15 10:20:52.723583 kernel: efi: EFI v2.70 by EDK II May 15 10:20:52.723590 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 15 10:20:52.723595 kernel: random: crng init done May 15 10:20:52.723601 kernel: ACPI: Early table checksum verification disabled May 15 10:20:52.723608 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 15 10:20:52.723615 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 15 10:20:52.723622 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:20:52.723627 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:20:52.723633 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:20:52.723639 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:20:52.723645 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:20:52.723651 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:20:52.723660 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:20:52.723666 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:20:52.723673 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:20:52.723679 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 15 10:20:52.723685 kernel: NUMA: Failed to initialise from firmware May 15 10:20:52.723692 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 15 10:20:52.723698 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] May 15 10:20:52.723704 kernel: Zone ranges: May 15 10:20:52.723710 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 15 10:20:52.723717 kernel: DMA32 empty May 15 10:20:52.723723 kernel: Normal empty May 15 10:20:52.723730 kernel: Movable zone start for each node May 15 10:20:52.723736 kernel: Early memory node ranges May 15 10:20:52.723742 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 15 10:20:52.723748 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 15 10:20:52.723754 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 15 10:20:52.723760 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 15 10:20:52.723766 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 15 10:20:52.723772 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 15 10:20:52.723779 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 15 10:20:52.723822 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 15 10:20:52.723832 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 15 10:20:52.723838 kernel: psci: probing for conduit method from ACPI. May 15 10:20:52.723844 kernel: psci: PSCIv1.1 detected in firmware. May 15 10:20:52.723850 kernel: psci: Using standard PSCI v0.2 function IDs May 15 10:20:52.723857 kernel: psci: Trusted OS migration not required May 15 10:20:52.723866 kernel: psci: SMC Calling Convention v1.1 May 15 10:20:52.723872 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 15 10:20:52.723880 kernel: ACPI: SRAT not present May 15 10:20:52.723887 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 15 10:20:52.723894 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 15 10:20:52.723901 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 15 10:20:52.723907 kernel: Detected PIPT I-cache on CPU0 May 15 10:20:52.723914 kernel: CPU features: detected: GIC system register CPU interface May 15 10:20:52.723920 kernel: CPU features: detected: Hardware dirty bit management May 15 10:20:52.723927 kernel: CPU features: detected: Spectre-v4 May 15 10:20:52.723933 kernel: CPU features: detected: Spectre-BHB May 15 10:20:52.723941 kernel: CPU features: kernel page table isolation forced ON by KASLR May 15 10:20:52.723947 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 15 10:20:52.723954 kernel: CPU features: detected: ARM erratum 1418040 May 15 10:20:52.723960 kernel: CPU features: detected: SSBS not fully self-synchronizing May 15 10:20:52.723967 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 15 10:20:52.723974 kernel: Policy zone: DMA May 15 10:20:52.723981 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=aa29d2e9841b6b978238db9eff73afa5af149616ae25608914babb265d82dda7 May 15 10:20:52.723989 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 10:20:52.723995 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 10:20:52.724002 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 10:20:52.724009 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 10:20:52.724017 kernel: Memory: 2457404K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36416K init, 777K bss, 114884K reserved, 0K cma-reserved) May 15 10:20:52.724023 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 15 10:20:52.724030 kernel: trace event string verifier disabled May 15 10:20:52.724036 kernel: rcu: Preemptible hierarchical RCU implementation. May 15 10:20:52.724043 kernel: rcu: RCU event tracing is enabled. May 15 10:20:52.724050 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 15 10:20:52.724057 kernel: Trampoline variant of Tasks RCU enabled. May 15 10:20:52.724064 kernel: Tracing variant of Tasks RCU enabled. May 15 10:20:52.724070 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 10:20:52.724077 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 15 10:20:52.724084 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 15 10:20:52.724091 kernel: GICv3: 256 SPIs implemented May 15 10:20:52.724098 kernel: GICv3: 0 Extended SPIs implemented May 15 10:20:52.724105 kernel: GICv3: Distributor has no Range Selector support May 15 10:20:52.724111 kernel: Root IRQ handler: gic_handle_irq May 15 10:20:52.724118 kernel: GICv3: 16 PPIs implemented May 15 10:20:52.724124 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 15 10:20:52.724131 kernel: ACPI: SRAT not present May 15 10:20:52.724137 kernel: ITS [mem 0x08080000-0x0809ffff] May 15 10:20:52.724144 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 15 10:20:52.724150 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 15 10:20:52.724164 kernel: GICv3: using LPI property table @0x00000000400d0000 May 15 10:20:52.724172 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 15 10:20:52.724180 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:20:52.724187 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 15 10:20:52.724194 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 15 10:20:52.724200 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 15 10:20:52.724207 kernel: arm-pv: using stolen time PV May 15 10:20:52.724214 kernel: Console: colour dummy device 80x25 May 15 10:20:52.724220 kernel: ACPI: Core revision 20210730 May 15 10:20:52.724228 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 15 10:20:52.724234 kernel: pid_max: default: 32768 minimum: 301 May 15 10:20:52.724241 kernel: LSM: Security Framework initializing May 15 10:20:52.724249 kernel: SELinux: Initializing. May 15 10:20:52.724256 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:20:52.724263 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:20:52.724270 kernel: ACPI PPTT: PPTT table found, but unable to locate core 3 (3) May 15 10:20:52.724276 kernel: rcu: Hierarchical SRCU implementation. May 15 10:20:52.724283 kernel: Platform MSI: ITS@0x8080000 domain created May 15 10:20:52.724290 kernel: PCI/MSI: ITS@0x8080000 domain created May 15 10:20:52.724297 kernel: Remapping and enabling EFI services. May 15 10:20:52.724304 kernel: smp: Bringing up secondary CPUs ... May 15 10:20:52.724312 kernel: Detected PIPT I-cache on CPU1 May 15 10:20:52.724319 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 15 10:20:52.724325 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 15 10:20:52.724332 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:20:52.724339 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 15 10:20:52.724346 kernel: Detected PIPT I-cache on CPU2 May 15 10:20:52.724358 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 15 10:20:52.724366 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 15 10:20:52.724373 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:20:52.724380 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 15 10:20:52.724388 kernel: Detected PIPT I-cache on CPU3 May 15 10:20:52.724395 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 15 10:20:52.724402 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 15 10:20:52.724409 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:20:52.724420 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 15 10:20:52.724428 kernel: smp: Brought up 1 node, 4 CPUs May 15 10:20:52.724435 kernel: SMP: Total of 4 processors activated. May 15 10:20:52.724442 kernel: CPU features: detected: 32-bit EL0 Support May 15 10:20:52.724450 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 15 10:20:52.724457 kernel: CPU features: detected: Common not Private translations May 15 10:20:52.724464 kernel: CPU features: detected: CRC32 instructions May 15 10:20:52.724471 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 15 10:20:52.724479 kernel: CPU features: detected: LSE atomic instructions May 15 10:20:52.724486 kernel: CPU features: detected: Privileged Access Never May 15 10:20:52.724493 kernel: CPU features: detected: RAS Extension Support May 15 10:20:52.724501 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 15 10:20:52.724549 kernel: CPU: All CPU(s) started at EL1 May 15 10:20:52.724559 kernel: alternatives: patching kernel code May 15 10:20:52.724567 kernel: devtmpfs: initialized May 15 10:20:52.724574 kernel: KASLR enabled May 15 10:20:52.724581 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 10:20:52.724588 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 15 10:20:52.724595 kernel: pinctrl core: initialized pinctrl subsystem May 15 10:20:52.724602 kernel: SMBIOS 3.0.0 present. May 15 10:20:52.724610 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 15 10:20:52.724617 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 10:20:52.724625 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 15 10:20:52.724632 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 15 10:20:52.724639 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 15 10:20:52.724647 kernel: audit: initializing netlink subsys (disabled) May 15 10:20:52.724654 kernel: audit: type=2000 audit(0.033:1): state=initialized audit_enabled=0 res=1 May 15 10:20:52.724661 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 10:20:52.724668 kernel: cpuidle: using governor menu May 15 10:20:52.724675 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 15 10:20:52.724682 kernel: ASID allocator initialised with 32768 entries May 15 10:20:52.724691 kernel: ACPI: bus type PCI registered May 15 10:20:52.724698 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 10:20:52.724705 kernel: Serial: AMBA PL011 UART driver May 15 10:20:52.724712 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 10:20:52.724719 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 15 10:20:52.724726 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 10:20:52.724733 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 15 10:20:52.724740 kernel: cryptd: max_cpu_qlen set to 1000 May 15 10:20:52.724748 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 15 10:20:52.724757 kernel: ACPI: Added _OSI(Module Device) May 15 10:20:52.724764 kernel: ACPI: Added _OSI(Processor Device) May 15 10:20:52.724771 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 10:20:52.724778 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 10:20:52.724785 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 10:20:52.724792 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 10:20:52.724799 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 10:20:52.724807 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 10:20:52.724814 kernel: ACPI: Interpreter enabled May 15 10:20:52.724822 kernel: ACPI: Using GIC for interrupt routing May 15 10:20:52.724829 kernel: ACPI: MCFG table detected, 1 entries May 15 10:20:52.724836 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 15 10:20:52.724843 kernel: printk: console [ttyAMA0] enabled May 15 10:20:52.724850 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 10:20:52.724974 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 10:20:52.725037 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 15 10:20:52.725098 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 15 10:20:52.725154 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 15 10:20:52.725258 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 15 10:20:52.725268 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 15 10:20:52.725275 kernel: PCI host bridge to bus 0000:00 May 15 10:20:52.725363 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 15 10:20:52.725426 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 15 10:20:52.725480 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 15 10:20:52.725533 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 10:20:52.725607 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 15 10:20:52.725680 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 15 10:20:52.725740 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 15 10:20:52.725798 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 15 10:20:52.725856 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 15 10:20:52.725916 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 15 10:20:52.725974 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 15 10:20:52.726035 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 15 10:20:52.726087 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 15 10:20:52.726138 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 15 10:20:52.726205 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 15 10:20:52.726216 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 15 10:20:52.726223 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 15 10:20:52.726232 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 15 10:20:52.726239 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 15 10:20:52.726246 kernel: iommu: Default domain type: Translated May 15 10:20:52.726253 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 15 10:20:52.726260 kernel: vgaarb: loaded May 15 10:20:52.726267 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 10:20:52.726274 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 10:20:52.726281 kernel: PTP clock support registered May 15 10:20:52.726288 kernel: Registered efivars operations May 15 10:20:52.726296 kernel: clocksource: Switched to clocksource arch_sys_counter May 15 10:20:52.726303 kernel: VFS: Disk quotas dquot_6.6.0 May 15 10:20:52.726310 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 10:20:52.726317 kernel: pnp: PnP ACPI init May 15 10:20:52.726399 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 15 10:20:52.726410 kernel: pnp: PnP ACPI: found 1 devices May 15 10:20:52.726417 kernel: NET: Registered PF_INET protocol family May 15 10:20:52.726424 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 10:20:52.726434 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 10:20:52.726441 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 10:20:52.726448 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 10:20:52.726455 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 10:20:52.726462 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 10:20:52.726469 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:20:52.726476 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:20:52.726483 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 10:20:52.726490 kernel: PCI: CLS 0 bytes, default 64 May 15 10:20:52.726499 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 15 10:20:52.726506 kernel: kvm [1]: HYP mode not available May 15 10:20:52.726513 kernel: Initialise system trusted keyrings May 15 10:20:52.726519 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 10:20:52.726526 kernel: Key type asymmetric registered May 15 10:20:52.726534 kernel: Asymmetric key parser 'x509' registered May 15 10:20:52.726541 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 10:20:52.726548 kernel: io scheduler mq-deadline registered May 15 10:20:52.726554 kernel: io scheduler kyber registered May 15 10:20:52.726563 kernel: io scheduler bfq registered May 15 10:20:52.726570 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 15 10:20:52.726577 kernel: ACPI: button: Power Button [PWRB] May 15 10:20:52.726584 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 15 10:20:52.726645 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 15 10:20:52.726654 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 10:20:52.726661 kernel: thunder_xcv, ver 1.0 May 15 10:20:52.726668 kernel: thunder_bgx, ver 1.0 May 15 10:20:52.726674 kernel: nicpf, ver 1.0 May 15 10:20:52.726683 kernel: nicvf, ver 1.0 May 15 10:20:52.726748 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 15 10:20:52.726805 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-15T10:20:52 UTC (1747304452) May 15 10:20:52.726814 kernel: hid: raw HID events driver (C) Jiri Kosina May 15 10:20:52.726821 kernel: NET: Registered PF_INET6 protocol family May 15 10:20:52.726828 kernel: Segment Routing with IPv6 May 15 10:20:52.726835 kernel: In-situ OAM (IOAM) with IPv6 May 15 10:20:52.726842 kernel: NET: Registered PF_PACKET protocol family May 15 10:20:52.726850 kernel: Key type dns_resolver registered May 15 10:20:52.726857 kernel: registered taskstats version 1 May 15 10:20:52.726864 kernel: Loading compiled-in X.509 certificates May 15 10:20:52.726871 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 3679cbfb4d4756a2ddc177f0eaedea33fb5fdf2e' May 15 10:20:52.726878 kernel: Key type .fscrypt registered May 15 10:20:52.726885 kernel: Key type fscrypt-provisioning registered May 15 10:20:52.726892 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 10:20:52.726899 kernel: ima: Allocated hash algorithm: sha1 May 15 10:20:52.726905 kernel: ima: No architecture policies found May 15 10:20:52.726913 kernel: clk: Disabling unused clocks May 15 10:20:52.726920 kernel: Freeing unused kernel memory: 36416K May 15 10:20:52.726941 kernel: Run /init as init process May 15 10:20:52.726948 kernel: with arguments: May 15 10:20:52.726955 kernel: /init May 15 10:20:52.726961 kernel: with environment: May 15 10:20:52.726968 kernel: HOME=/ May 15 10:20:52.726975 kernel: TERM=linux May 15 10:20:52.726982 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 10:20:52.726992 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:20:52.727001 systemd[1]: Detected virtualization kvm. May 15 10:20:52.727008 systemd[1]: Detected architecture arm64. May 15 10:20:52.727015 systemd[1]: Running in initrd. May 15 10:20:52.727022 systemd[1]: No hostname configured, using default hostname. May 15 10:20:52.727030 systemd[1]: Hostname set to . May 15 10:20:52.727037 systemd[1]: Initializing machine ID from VM UUID. May 15 10:20:52.727046 systemd[1]: Queued start job for default target initrd.target. May 15 10:20:52.727053 systemd[1]: Started systemd-ask-password-console.path. May 15 10:20:52.727060 systemd[1]: Reached target cryptsetup.target. May 15 10:20:52.727068 systemd[1]: Reached target paths.target. May 15 10:20:52.727075 systemd[1]: Reached target slices.target. May 15 10:20:52.727083 systemd[1]: Reached target swap.target. May 15 10:20:52.727090 systemd[1]: Reached target timers.target. May 15 10:20:52.727097 systemd[1]: Listening on iscsid.socket. May 15 10:20:52.727106 systemd[1]: Listening on iscsiuio.socket. May 15 10:20:52.727113 systemd[1]: Listening on systemd-journald-audit.socket. May 15 10:20:52.727121 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 10:20:52.727128 systemd[1]: Listening on systemd-journald.socket. May 15 10:20:52.727135 systemd[1]: Listening on systemd-networkd.socket. May 15 10:20:52.727143 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:20:52.727150 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:20:52.727211 systemd[1]: Reached target sockets.target. May 15 10:20:52.727223 systemd[1]: Starting kmod-static-nodes.service... May 15 10:20:52.727230 systemd[1]: Finished network-cleanup.service. May 15 10:20:52.727237 systemd[1]: Starting systemd-fsck-usr.service... May 15 10:20:52.727245 systemd[1]: Starting systemd-journald.service... May 15 10:20:52.727252 systemd[1]: Starting systemd-modules-load.service... May 15 10:20:52.727259 systemd[1]: Starting systemd-resolved.service... May 15 10:20:52.727266 systemd[1]: Starting systemd-vconsole-setup.service... May 15 10:20:52.727273 systemd[1]: Finished kmod-static-nodes.service. May 15 10:20:52.727280 systemd[1]: Finished systemd-fsck-usr.service. May 15 10:20:52.727289 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:20:52.727296 systemd[1]: Finished systemd-vconsole-setup.service. May 15 10:20:52.727304 kernel: audit: type=1130 audit(1747304452.721:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:52.727312 systemd[1]: Starting dracut-cmdline-ask.service... May 15 10:20:52.727319 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:20:52.727327 kernel: audit: type=1130 audit(1747304452.726:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:52.727337 systemd-journald[289]: Journal started May 15 10:20:52.727387 systemd-journald[289]: Runtime Journal (/run/log/journal/da2e5d67d6bb442f9a9dd2b887753b44) is 6.0M, max 48.7M, 42.6M free. May 15 10:20:52.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:52.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:52.717816 systemd-modules-load[290]: Inserted module 'overlay' May 15 10:20:52.733374 systemd[1]: Started systemd-journald.service. May 15 10:20:52.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:52.737200 kernel: audit: type=1130 audit(1747304452.734:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:52.740178 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 10:20:52.743756 systemd[1]: Finished dracut-cmdline-ask.service. May 15 10:20:52.746062 systemd-modules-load[290]: Inserted module 'br_netfilter' May 15 10:20:52.746969 kernel: Bridge firewalling registered May 15 10:20:52.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:52.747601 systemd-resolved[291]: Positive Trust Anchors: May 15 10:20:52.751124 kernel: audit: type=1130 audit(1747304452.745:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:52.747614 systemd-resolved[291]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:20:52.747642 systemd-resolved[291]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:20:52.748006 systemd[1]: Starting dracut-cmdline.service... May 15 10:20:52.752256 systemd-resolved[291]: Defaulting to hostname 'linux'. May 15 10:20:52.765731 kernel: SCSI subsystem initialized May 15 10:20:52.759663 systemd[1]: Started systemd-resolved.service. May 15 10:20:52.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:52.769766 dracut-cmdline[308]: dracut-dracut-053 May 15 10:20:52.769766 dracut-cmdline[308]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=aa29d2e9841b6b978238db9eff73afa5af149616ae25608914babb265d82dda7 May 15 10:20:52.777359 kernel: audit: type=1130 audit(1747304452.764:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:52.777383 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 10:20:52.777393 kernel: device-mapper: uevent: version 1.0.3 May 15 10:20:52.765087 systemd[1]: Reached target nss-lookup.target. May 15 10:20:52.780190 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 10:20:52.781915 systemd-modules-load[290]: Inserted module 'dm_multipath' May 15 10:20:52.782693 systemd[1]: Finished systemd-modules-load.service. May 15 10:20:52.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:52.784515 systemd[1]: Starting systemd-sysctl.service... May 15 10:20:52.788338 kernel: audit: type=1130 audit(1747304452.783:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:52.793972 systemd[1]: Finished systemd-sysctl.service. May 15 10:20:52.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:52.798172 kernel: audit: type=1130 audit(1747304452.794:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:52.834186 kernel: Loading iSCSI transport class v2.0-870. May 15 10:20:52.846188 kernel: iscsi: registered transport (tcp) May 15 10:20:52.864364 kernel: iscsi: registered transport (qla4xxx) May 15 10:20:52.864422 kernel: QLogic iSCSI HBA Driver May 15 10:20:52.899652 systemd[1]: Finished dracut-cmdline.service. May 15 10:20:52.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:52.901467 systemd[1]: Starting dracut-pre-udev.service... May 15 10:20:52.905130 kernel: audit: type=1130 audit(1747304452.900:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:52.947185 kernel: raid6: neonx8 gen() 13754 MB/s May 15 10:20:52.964179 kernel: raid6: neonx8 xor() 10776 MB/s May 15 10:20:52.981178 kernel: raid6: neonx4 gen() 13546 MB/s May 15 10:20:52.998178 kernel: raid6: neonx4 xor() 11132 MB/s May 15 10:20:53.015175 kernel: raid6: neonx2 gen() 12947 MB/s May 15 10:20:53.032179 kernel: raid6: neonx2 xor() 10251 MB/s May 15 10:20:53.049180 kernel: raid6: neonx1 gen() 10580 MB/s May 15 10:20:53.066223 kernel: raid6: neonx1 xor() 8759 MB/s May 15 10:20:53.083209 kernel: raid6: int64x8 gen() 6253 MB/s May 15 10:20:53.100189 kernel: raid6: int64x8 xor() 3533 MB/s May 15 10:20:53.117184 kernel: raid6: int64x4 gen() 7207 MB/s May 15 10:20:53.134182 kernel: raid6: int64x4 xor() 3847 MB/s May 15 10:20:53.151183 kernel: raid6: int64x2 gen() 6136 MB/s May 15 10:20:53.168212 kernel: raid6: int64x2 xor() 3304 MB/s May 15 10:20:53.185199 kernel: raid6: int64x1 gen() 5031 MB/s May 15 10:20:53.202265 kernel: raid6: int64x1 xor() 2641 MB/s May 15 10:20:53.202277 kernel: raid6: using algorithm neonx8 gen() 13754 MB/s May 15 10:20:53.202286 kernel: raid6: .... xor() 10776 MB/s, rmw enabled May 15 10:20:53.203354 kernel: raid6: using neon recovery algorithm May 15 10:20:53.213181 kernel: xor: measuring software checksum speed May 15 10:20:53.214495 kernel: 8regs : 15288 MB/sec May 15 10:20:53.214506 kernel: 32regs : 20686 MB/sec May 15 10:20:53.215760 kernel: arm64_neon : 27570 MB/sec May 15 10:20:53.215770 kernel: xor: using function: arm64_neon (27570 MB/sec) May 15 10:20:53.272185 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 15 10:20:53.282747 systemd[1]: Finished dracut-pre-udev.service. May 15 10:20:53.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:53.286000 audit: BPF prog-id=7 op=LOAD May 15 10:20:53.286000 audit: BPF prog-id=8 op=LOAD May 15 10:20:53.286898 systemd[1]: Starting systemd-udevd.service... May 15 10:20:53.288265 kernel: audit: type=1130 audit(1747304453.283:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:53.298922 systemd-udevd[492]: Using default interface naming scheme 'v252'. May 15 10:20:53.302207 systemd[1]: Started systemd-udevd.service. May 15 10:20:53.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:53.304199 systemd[1]: Starting dracut-pre-trigger.service... May 15 10:20:53.315591 dracut-pre-trigger[499]: rd.md=0: removing MD RAID activation May 15 10:20:53.340977 systemd[1]: Finished dracut-pre-trigger.service. May 15 10:20:53.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:53.342541 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:20:53.375229 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:20:53.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:53.412411 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 15 10:20:53.419576 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 10:20:53.419589 kernel: GPT:9289727 != 19775487 May 15 10:20:53.419598 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 10:20:53.419606 kernel: GPT:9289727 != 19775487 May 15 10:20:53.419620 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 10:20:53.419629 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:20:53.435190 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (539) May 15 10:20:53.436278 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 10:20:53.437441 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 10:20:53.442072 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 10:20:53.449048 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 10:20:53.452478 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:20:53.454114 systemd[1]: Starting disk-uuid.service... May 15 10:20:53.460134 disk-uuid[563]: Primary Header is updated. May 15 10:20:53.460134 disk-uuid[563]: Secondary Entries is updated. May 15 10:20:53.460134 disk-uuid[563]: Secondary Header is updated. May 15 10:20:53.463513 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:20:54.477038 disk-uuid[564]: The operation has completed successfully. May 15 10:20:54.478531 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:20:54.499202 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 10:20:54.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:54.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:54.499318 systemd[1]: Finished disk-uuid.service. May 15 10:20:54.501122 systemd[1]: Starting verity-setup.service... May 15 10:20:54.524214 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 15 10:20:54.549522 systemd[1]: Found device dev-mapper-usr.device. May 15 10:20:54.551369 systemd[1]: Mounting sysusr-usr.mount... May 15 10:20:54.552403 systemd[1]: Finished verity-setup.service. May 15 10:20:54.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:54.607856 systemd[1]: Mounted sysusr-usr.mount. May 15 10:20:54.609351 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 10:20:54.608797 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 10:20:54.609578 systemd[1]: Starting ignition-setup.service... May 15 10:20:54.612275 systemd[1]: Starting parse-ip-for-networkd.service... May 15 10:20:54.619206 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 15 10:20:54.619241 kernel: BTRFS info (device vda6): using free space tree May 15 10:20:54.619252 kernel: BTRFS info (device vda6): has skinny extents May 15 10:20:54.631680 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 10:20:54.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:54.638801 systemd[1]: Finished ignition-setup.service. May 15 10:20:54.641601 systemd[1]: Starting ignition-fetch-offline.service... May 15 10:20:54.699378 systemd[1]: Finished parse-ip-for-networkd.service. May 15 10:20:54.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:54.700000 audit: BPF prog-id=9 op=LOAD May 15 10:20:54.701799 systemd[1]: Starting systemd-networkd.service... May 15 10:20:54.729029 ignition[658]: Ignition 2.14.0 May 15 10:20:54.729040 ignition[658]: Stage: fetch-offline May 15 10:20:54.729076 ignition[658]: no configs at "/usr/lib/ignition/base.d" May 15 10:20:54.729098 ignition[658]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:20:54.729251 ignition[658]: parsed url from cmdline: "" May 15 10:20:54.732686 systemd-networkd[739]: lo: Link UP May 15 10:20:54.729254 ignition[658]: no config URL provided May 15 10:20:54.732689 systemd-networkd[739]: lo: Gained carrier May 15 10:20:54.729259 ignition[658]: reading system config file "/usr/lib/ignition/user.ign" May 15 10:20:54.733037 systemd-networkd[739]: Enumeration completed May 15 10:20:54.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:54.729267 ignition[658]: no config at "/usr/lib/ignition/user.ign" May 15 10:20:54.733223 systemd-networkd[739]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:20:54.729284 ignition[658]: op(1): [started] loading QEMU firmware config module May 15 10:20:54.734578 systemd-networkd[739]: eth0: Link UP May 15 10:20:54.729289 ignition[658]: op(1): executing: "modprobe" "qemu_fw_cfg" May 15 10:20:54.734582 systemd-networkd[739]: eth0: Gained carrier May 15 10:20:54.735595 systemd[1]: Started systemd-networkd.service. May 15 10:20:54.737365 systemd[1]: Reached target network.target. May 15 10:20:54.739546 systemd[1]: Starting iscsiuio.service... May 15 10:20:54.747271 ignition[658]: op(1): [finished] loading QEMU firmware config module May 15 10:20:54.747297 ignition[658]: QEMU firmware config was not found. Ignoring... May 15 10:20:54.750683 systemd[1]: Started iscsiuio.service. May 15 10:20:54.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:54.752325 systemd-networkd[739]: eth0: DHCPv4 address 10.0.0.103/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:20:54.752368 systemd[1]: Starting iscsid.service... May 15 10:20:54.759173 iscsid[746]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 10:20:54.759173 iscsid[746]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 10:20:54.759173 iscsid[746]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 10:20:54.759173 iscsid[746]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 10:20:54.759173 iscsid[746]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 10:20:54.759173 iscsid[746]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 10:20:54.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:54.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:54.758712 systemd[1]: Started iscsid.service. May 15 10:20:54.760376 systemd[1]: Starting dracut-initqueue.service... May 15 10:20:54.770002 systemd[1]: Finished dracut-initqueue.service. May 15 10:20:54.771098 systemd[1]: Reached target remote-fs-pre.target. May 15 10:20:54.773117 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:20:54.774630 systemd[1]: Reached target remote-fs.target. May 15 10:20:54.776786 systemd[1]: Starting dracut-pre-mount.service... May 15 10:20:54.784025 systemd[1]: Finished dracut-pre-mount.service. May 15 10:20:54.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:54.808019 ignition[658]: parsing config with SHA512: 032b14b90255f0af8cba4e707a02a842021043255e105ecf2eaf8ecad37c01213697ea1f19b99ff04d2589e2710fa8110c76c72f785a544fe3dca8598582d678 May 15 10:20:54.817485 unknown[658]: fetched base config from "system" May 15 10:20:54.817499 unknown[658]: fetched user config from "qemu" May 15 10:20:54.818079 ignition[658]: fetch-offline: fetch-offline passed May 15 10:20:54.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:54.818954 systemd[1]: Finished ignition-fetch-offline.service. May 15 10:20:54.818144 ignition[658]: Ignition finished successfully May 15 10:20:54.820067 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 10:20:54.820821 systemd[1]: Starting ignition-kargs.service... May 15 10:20:54.828883 ignition[760]: Ignition 2.14.0 May 15 10:20:54.828893 ignition[760]: Stage: kargs May 15 10:20:54.828978 ignition[760]: no configs at "/usr/lib/ignition/base.d" May 15 10:20:54.831054 systemd[1]: Finished ignition-kargs.service. May 15 10:20:54.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:54.828988 ignition[760]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:20:54.829820 ignition[760]: kargs: kargs passed May 15 10:20:54.833267 systemd[1]: Starting ignition-disks.service... May 15 10:20:54.829860 ignition[760]: Ignition finished successfully May 15 10:20:54.839234 ignition[766]: Ignition 2.14.0 May 15 10:20:54.839242 ignition[766]: Stage: disks May 15 10:20:54.839323 ignition[766]: no configs at "/usr/lib/ignition/base.d" May 15 10:20:54.839369 ignition[766]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:20:54.840213 ignition[766]: disks: disks passed May 15 10:20:54.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:54.842066 systemd[1]: Finished ignition-disks.service. May 15 10:20:54.840250 ignition[766]: Ignition finished successfully May 15 10:20:54.843797 systemd[1]: Reached target initrd-root-device.target. May 15 10:20:54.845008 systemd[1]: Reached target local-fs-pre.target. May 15 10:20:54.846326 systemd[1]: Reached target local-fs.target. May 15 10:20:54.847599 systemd[1]: Reached target sysinit.target. May 15 10:20:54.848916 systemd[1]: Reached target basic.target. May 15 10:20:54.850970 systemd[1]: Starting systemd-fsck-root.service... May 15 10:20:54.861327 systemd-fsck[774]: ROOT: clean, 623/553520 files, 56022/553472 blocks May 15 10:20:54.864675 systemd[1]: Finished systemd-fsck-root.service. May 15 10:20:54.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:54.866696 systemd[1]: Mounting sysroot.mount... May 15 10:20:54.873184 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 10:20:54.873173 systemd[1]: Mounted sysroot.mount. May 15 10:20:54.873937 systemd[1]: Reached target initrd-root-fs.target. May 15 10:20:54.876259 systemd[1]: Mounting sysroot-usr.mount... May 15 10:20:54.877142 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 10:20:54.877241 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 10:20:54.877266 systemd[1]: Reached target ignition-diskful.target. May 15 10:20:54.879051 systemd[1]: Mounted sysroot-usr.mount. May 15 10:20:54.881064 systemd[1]: Starting initrd-setup-root.service... May 15 10:20:54.885153 initrd-setup-root[784]: cut: /sysroot/etc/passwd: No such file or directory May 15 10:20:54.888598 initrd-setup-root[792]: cut: /sysroot/etc/group: No such file or directory May 15 10:20:54.892481 initrd-setup-root[800]: cut: /sysroot/etc/shadow: No such file or directory May 15 10:20:54.895953 initrd-setup-root[808]: cut: /sysroot/etc/gshadow: No such file or directory May 15 10:20:54.922196 systemd[1]: Finished initrd-setup-root.service. May 15 10:20:54.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:54.923794 systemd[1]: Starting ignition-mount.service... May 15 10:20:54.925320 systemd[1]: Starting sysroot-boot.service... May 15 10:20:54.928864 bash[825]: umount: /sysroot/usr/share/oem: not mounted. May 15 10:20:54.937011 ignition[827]: INFO : Ignition 2.14.0 May 15 10:20:54.937011 ignition[827]: INFO : Stage: mount May 15 10:20:54.939292 ignition[827]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:20:54.939292 ignition[827]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:20:54.939292 ignition[827]: INFO : mount: mount passed May 15 10:20:54.939292 ignition[827]: INFO : Ignition finished successfully May 15 10:20:54.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:54.939239 systemd[1]: Finished ignition-mount.service. May 15 10:20:54.946736 systemd[1]: Finished sysroot-boot.service. May 15 10:20:54.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:55.559691 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 10:20:55.566697 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (835) May 15 10:20:55.566732 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 15 10:20:55.566742 kernel: BTRFS info (device vda6): using free space tree May 15 10:20:55.568170 kernel: BTRFS info (device vda6): has skinny extents May 15 10:20:55.570934 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 10:20:55.572631 systemd[1]: Starting ignition-files.service... May 15 10:20:55.587460 ignition[855]: INFO : Ignition 2.14.0 May 15 10:20:55.587460 ignition[855]: INFO : Stage: files May 15 10:20:55.589068 ignition[855]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:20:55.589068 ignition[855]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:20:55.589068 ignition[855]: DEBUG : files: compiled without relabeling support, skipping May 15 10:20:55.592386 ignition[855]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 10:20:55.592386 ignition[855]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 10:20:55.596209 ignition[855]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 10:20:55.597595 ignition[855]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 10:20:55.599129 unknown[855]: wrote ssh authorized keys file for user: core May 15 10:20:55.600339 ignition[855]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 10:20:55.600339 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 15 10:20:55.600339 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 May 15 10:20:55.803379 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 15 10:20:55.909027 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 15 10:20:55.910933 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 15 10:20:55.912620 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 15 10:20:55.912620 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 15 10:20:55.912620 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 15 10:20:55.912620 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:20:55.912620 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:20:55.912620 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:20:55.912620 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:20:55.912620 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:20:55.925395 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:20:55.925395 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 15 10:20:55.925395 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 15 10:20:55.925395 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 15 10:20:55.925395 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-arm64.raw: attempt #1 May 15 10:20:56.322276 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 15 10:20:56.633471 systemd-networkd[739]: eth0: Gained IPv6LL May 15 10:20:56.880375 ignition[855]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 15 10:20:56.880375 ignition[855]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 15 10:20:56.884702 ignition[855]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:20:56.884702 ignition[855]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:20:56.884702 ignition[855]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 15 10:20:56.884702 ignition[855]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 15 10:20:56.884702 ignition[855]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:20:56.884702 ignition[855]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:20:56.884702 ignition[855]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 15 10:20:56.884702 ignition[855]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 15 10:20:56.884702 ignition[855]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 15 10:20:56.884702 ignition[855]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 15 10:20:56.884702 ignition[855]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:20:56.946147 ignition[855]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:20:56.947655 ignition[855]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 15 10:20:56.947655 ignition[855]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 10:20:56.947655 ignition[855]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 10:20:56.947655 ignition[855]: INFO : files: files passed May 15 10:20:56.947655 ignition[855]: INFO : Ignition finished successfully May 15 10:20:56.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:56.947905 systemd[1]: Finished ignition-files.service. May 15 10:20:56.950927 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 10:20:56.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:56.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:56.952453 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 10:20:56.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:56.962149 initrd-setup-root-after-ignition[880]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 15 10:20:56.953082 systemd[1]: Starting ignition-quench.service... May 15 10:20:56.965518 initrd-setup-root-after-ignition[882]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 10:20:56.956890 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 10:20:56.956970 systemd[1]: Finished ignition-quench.service. May 15 10:20:56.959492 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 10:20:56.960569 systemd[1]: Reached target ignition-complete.target. May 15 10:20:56.963606 systemd[1]: Starting initrd-parse-etc.service... May 15 10:20:56.975626 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 10:20:56.975715 systemd[1]: Finished initrd-parse-etc.service. May 15 10:20:56.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:56.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:56.977383 systemd[1]: Reached target initrd-fs.target. May 15 10:20:56.978584 systemd[1]: Reached target initrd.target. May 15 10:20:56.979860 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 10:20:56.980867 systemd[1]: Starting dracut-pre-pivot.service... May 15 10:20:56.990772 systemd[1]: Finished dracut-pre-pivot.service. May 15 10:20:56.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:56.992282 systemd[1]: Starting initrd-cleanup.service... May 15 10:20:56.999893 systemd[1]: Stopped target nss-lookup.target. May 15 10:20:57.000790 systemd[1]: Stopped target remote-cryptsetup.target. May 15 10:20:57.002280 systemd[1]: Stopped target timers.target. May 15 10:20:57.003662 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 10:20:57.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.003796 systemd[1]: Stopped dracut-pre-pivot.service. May 15 10:20:57.005120 systemd[1]: Stopped target initrd.target. May 15 10:20:57.006456 systemd[1]: Stopped target basic.target. May 15 10:20:57.007818 systemd[1]: Stopped target ignition-complete.target. May 15 10:20:57.009219 systemd[1]: Stopped target ignition-diskful.target. May 15 10:20:57.010606 systemd[1]: Stopped target initrd-root-device.target. May 15 10:20:57.012184 systemd[1]: Stopped target remote-fs.target. May 15 10:20:57.013620 systemd[1]: Stopped target remote-fs-pre.target. May 15 10:20:57.015062 systemd[1]: Stopped target sysinit.target. May 15 10:20:57.016378 systemd[1]: Stopped target local-fs.target. May 15 10:20:57.017653 systemd[1]: Stopped target local-fs-pre.target. May 15 10:20:57.019033 systemd[1]: Stopped target swap.target. May 15 10:20:57.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.020291 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 10:20:57.020440 systemd[1]: Stopped dracut-pre-mount.service. May 15 10:20:57.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.021871 systemd[1]: Stopped target cryptsetup.target. May 15 10:20:57.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.023044 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 10:20:57.023176 systemd[1]: Stopped dracut-initqueue.service. May 15 10:20:57.024729 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 10:20:57.024849 systemd[1]: Stopped ignition-fetch-offline.service. May 15 10:20:57.026211 systemd[1]: Stopped target paths.target. May 15 10:20:57.027384 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 10:20:57.032202 systemd[1]: Stopped systemd-ask-password-console.path. May 15 10:20:57.033122 systemd[1]: Stopped target slices.target. May 15 10:20:57.034494 systemd[1]: Stopped target sockets.target. May 15 10:20:57.035766 systemd[1]: iscsid.socket: Deactivated successfully. May 15 10:20:57.035831 systemd[1]: Closed iscsid.socket. May 15 10:20:57.041950 kernel: kauditd_printk_skb: 34 callbacks suppressed May 15 10:20:57.041974 kernel: audit: type=1131 audit(1747304457.038:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.036997 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 10:20:57.045889 kernel: audit: type=1131 audit(1747304457.042:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.037115 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 10:20:57.038605 systemd[1]: ignition-files.service: Deactivated successfully. May 15 10:20:57.038725 systemd[1]: Stopped ignition-files.service. May 15 10:20:57.051810 ignition[895]: INFO : Ignition 2.14.0 May 15 10:20:57.051810 ignition[895]: INFO : Stage: umount May 15 10:20:57.051810 ignition[895]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:20:57.051810 ignition[895]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:20:57.064996 kernel: audit: type=1131 audit(1747304457.052:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.065023 kernel: audit: type=1131 audit(1747304457.055:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.065034 kernel: audit: type=1131 audit(1747304457.060:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.043758 systemd[1]: Stopping ignition-mount.service... May 15 10:20:57.072641 kernel: audit: type=1131 audit(1747304457.065:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.072795 ignition[895]: INFO : umount: umount passed May 15 10:20:57.072795 ignition[895]: INFO : Ignition finished successfully May 15 10:20:57.046748 systemd[1]: Stopping iscsiuio.service... May 15 10:20:57.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.049156 systemd[1]: Stopping sysroot-boot.service... May 15 10:20:57.083116 kernel: audit: type=1131 audit(1747304457.076:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.083136 kernel: audit: type=1131 audit(1747304457.079:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.051221 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 10:20:57.087260 kernel: audit: type=1131 audit(1747304457.083:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.051421 systemd[1]: Stopped systemd-udev-trigger.service. May 15 10:20:57.052775 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 10:20:57.052913 systemd[1]: Stopped dracut-pre-trigger.service. May 15 10:20:57.094425 kernel: audit: type=1130 audit(1747304457.090:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.058657 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 10:20:57.058755 systemd[1]: Stopped iscsiuio.service. May 15 10:20:57.061583 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 10:20:57.061662 systemd[1]: Stopped ignition-mount.service. May 15 10:20:57.068027 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 10:20:57.068283 systemd[1]: Stopped target network.target. May 15 10:20:57.073581 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 10:20:57.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.073615 systemd[1]: Closed iscsiuio.socket. May 15 10:20:57.075085 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 10:20:57.075140 systemd[1]: Stopped ignition-disks.service. May 15 10:20:57.076498 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 10:20:57.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.076539 systemd[1]: Stopped ignition-kargs.service. May 15 10:20:57.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.080073 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 10:20:57.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.080116 systemd[1]: Stopped ignition-setup.service. May 15 10:20:57.084073 systemd[1]: Stopping systemd-networkd.service... May 15 10:20:57.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.087990 systemd[1]: Stopping systemd-resolved.service... May 15 10:20:57.089455 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 10:20:57.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.089542 systemd[1]: Finished initrd-cleanup.service. May 15 10:20:57.098670 systemd-networkd[739]: eth0: DHCPv6 lease lost May 15 10:20:57.122000 audit: BPF prog-id=9 op=UNLOAD May 15 10:20:57.100359 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 10:20:57.124000 audit: BPF prog-id=6 op=UNLOAD May 15 10:20:57.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.100453 systemd[1]: Stopped systemd-networkd.service. May 15 10:20:57.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.102222 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 10:20:57.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.102251 systemd[1]: Closed systemd-networkd.socket. May 15 10:20:57.104782 systemd[1]: Stopping network-cleanup.service... May 15 10:20:57.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.105855 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 10:20:57.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.105917 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 10:20:57.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.107531 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 10:20:57.107575 systemd[1]: Stopped systemd-sysctl.service. May 15 10:20:57.110374 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 10:20:57.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.110419 systemd[1]: Stopped systemd-modules-load.service. May 15 10:20:57.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.111459 systemd[1]: Stopping systemd-udevd.service... May 15 10:20:57.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.115053 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 10:20:57.115491 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 10:20:57.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:57.115581 systemd[1]: Stopped systemd-resolved.service. May 15 10:20:57.119101 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 10:20:57.119262 systemd[1]: Stopped systemd-udevd.service. May 15 10:20:57.120751 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 10:20:57.120783 systemd[1]: Closed systemd-udevd-control.socket. May 15 10:20:57.122013 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 10:20:57.122042 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 10:20:57.123338 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 10:20:57.123386 systemd[1]: Stopped dracut-pre-udev.service. May 15 10:20:57.124859 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 10:20:57.124899 systemd[1]: Stopped dracut-cmdline.service. May 15 10:20:57.126382 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 10:20:57.126422 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 10:20:57.129627 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 10:20:57.130446 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 15 10:20:57.130506 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 15 10:20:57.132536 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 10:20:57.132592 systemd[1]: Stopped kmod-static-nodes.service. May 15 10:20:57.133592 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 10:20:57.133648 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 10:20:57.136304 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 15 10:20:57.136832 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 10:20:57.136945 systemd[1]: Stopped network-cleanup.service. May 15 10:20:57.139655 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 10:20:57.139730 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 10:20:57.141568 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 10:20:57.172569 systemd-journald[289]: Received SIGTERM from PID 1 (systemd). May 15 10:20:57.172602 iscsid[746]: iscsid shutting down. May 15 10:20:57.141644 systemd[1]: Stopped sysroot-boot.service. May 15 10:20:57.142989 systemd[1]: Reached target initrd-switch-root.target. May 15 10:20:57.144252 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 10:20:57.144326 systemd[1]: Stopped initrd-setup-root.service. May 15 10:20:57.146902 systemd[1]: Starting initrd-switch-root.service... May 15 10:20:57.153386 systemd[1]: Switching root. May 15 10:20:57.177882 systemd-journald[289]: Journal stopped May 15 10:20:59.233593 kernel: SELinux: Class mctp_socket not defined in policy. May 15 10:20:59.233644 kernel: SELinux: Class anon_inode not defined in policy. May 15 10:20:59.233656 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 10:20:59.233666 kernel: SELinux: policy capability network_peer_controls=1 May 15 10:20:59.233676 kernel: SELinux: policy capability open_perms=1 May 15 10:20:59.233690 kernel: SELinux: policy capability extended_socket_class=1 May 15 10:20:59.233700 kernel: SELinux: policy capability always_check_network=0 May 15 10:20:59.233711 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 10:20:59.233725 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 10:20:59.233734 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 10:20:59.233743 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 10:20:59.233759 systemd[1]: Successfully loaded SELinux policy in 35.675ms. May 15 10:20:59.233779 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.774ms. May 15 10:20:59.233791 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:20:59.233802 systemd[1]: Detected virtualization kvm. May 15 10:20:59.233812 systemd[1]: Detected architecture arm64. May 15 10:20:59.233823 systemd[1]: Detected first boot. May 15 10:20:59.233835 systemd[1]: Initializing machine ID from VM UUID. May 15 10:20:59.233846 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 10:20:59.233856 systemd[1]: Populated /etc with preset unit settings. May 15 10:20:59.233867 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:20:59.233878 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:20:59.233890 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:20:59.233901 systemd[1]: iscsid.service: Deactivated successfully. May 15 10:20:59.233913 systemd[1]: Stopped iscsid.service. May 15 10:20:59.233924 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 10:20:59.233934 systemd[1]: Stopped initrd-switch-root.service. May 15 10:20:59.233944 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 10:20:59.233955 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 10:20:59.233967 systemd[1]: Created slice system-addon\x2drun.slice. May 15 10:20:59.233977 systemd[1]: Created slice system-getty.slice. May 15 10:20:59.233987 systemd[1]: Created slice system-modprobe.slice. May 15 10:20:59.233997 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 10:20:59.234008 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 10:20:59.234018 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 10:20:59.234028 systemd[1]: Created slice user.slice. May 15 10:20:59.234040 systemd[1]: Started systemd-ask-password-console.path. May 15 10:20:59.234051 systemd[1]: Started systemd-ask-password-wall.path. May 15 10:20:59.234062 systemd[1]: Set up automount boot.automount. May 15 10:20:59.234073 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 10:20:59.234083 systemd[1]: Stopped target initrd-switch-root.target. May 15 10:20:59.234094 systemd[1]: Stopped target initrd-fs.target. May 15 10:20:59.234104 systemd[1]: Stopped target initrd-root-fs.target. May 15 10:20:59.234115 systemd[1]: Reached target integritysetup.target. May 15 10:20:59.234125 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:20:59.234135 systemd[1]: Reached target remote-fs.target. May 15 10:20:59.234147 systemd[1]: Reached target slices.target. May 15 10:20:59.234168 systemd[1]: Reached target swap.target. May 15 10:20:59.234179 systemd[1]: Reached target torcx.target. May 15 10:20:59.234189 systemd[1]: Reached target veritysetup.target. May 15 10:20:59.234200 systemd[1]: Listening on systemd-coredump.socket. May 15 10:20:59.234210 systemd[1]: Listening on systemd-initctl.socket. May 15 10:20:59.234220 systemd[1]: Listening on systemd-networkd.socket. May 15 10:20:59.234231 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:20:59.234241 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:20:59.234252 systemd[1]: Listening on systemd-userdbd.socket. May 15 10:20:59.234264 systemd[1]: Mounting dev-hugepages.mount... May 15 10:20:59.234274 systemd[1]: Mounting dev-mqueue.mount... May 15 10:20:59.234285 systemd[1]: Mounting media.mount... May 15 10:20:59.234300 systemd[1]: Mounting sys-kernel-debug.mount... May 15 10:20:59.234311 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 10:20:59.234322 systemd[1]: Mounting tmp.mount... May 15 10:20:59.234332 systemd[1]: Starting flatcar-tmpfiles.service... May 15 10:20:59.234347 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:20:59.234358 systemd[1]: Starting kmod-static-nodes.service... May 15 10:20:59.234377 systemd[1]: Starting modprobe@configfs.service... May 15 10:20:59.234388 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:20:59.234399 systemd[1]: Starting modprobe@drm.service... May 15 10:20:59.234409 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:20:59.234421 systemd[1]: Starting modprobe@fuse.service... May 15 10:20:59.234431 systemd[1]: Starting modprobe@loop.service... May 15 10:20:59.234442 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 10:20:59.234452 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 10:20:59.234463 systemd[1]: Stopped systemd-fsck-root.service. May 15 10:20:59.234475 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 10:20:59.234485 systemd[1]: Stopped systemd-fsck-usr.service. May 15 10:20:59.234495 systemd[1]: Stopped systemd-journald.service. May 15 10:20:59.234505 kernel: fuse: init (API version 7.34) May 15 10:20:59.234515 kernel: loop: module loaded May 15 10:20:59.234525 systemd[1]: Starting systemd-journald.service... May 15 10:20:59.234536 systemd[1]: Starting systemd-modules-load.service... May 15 10:20:59.234547 systemd[1]: Starting systemd-network-generator.service... May 15 10:20:59.234558 systemd[1]: Starting systemd-remount-fs.service... May 15 10:20:59.234569 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:20:59.234580 systemd[1]: verity-setup.service: Deactivated successfully. May 15 10:20:59.234590 systemd[1]: Stopped verity-setup.service. May 15 10:20:59.234600 systemd[1]: Mounted dev-hugepages.mount. May 15 10:20:59.234610 systemd[1]: Mounted dev-mqueue.mount. May 15 10:20:59.234621 systemd[1]: Mounted media.mount. May 15 10:20:59.234633 systemd-journald[998]: Journal started May 15 10:20:59.234677 systemd-journald[998]: Runtime Journal (/run/log/journal/da2e5d67d6bb442f9a9dd2b887753b44) is 6.0M, max 48.7M, 42.6M free. May 15 10:20:57.240000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 10:20:57.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:20:57.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:20:57.336000 audit: BPF prog-id=10 op=LOAD May 15 10:20:57.336000 audit: BPF prog-id=10 op=UNLOAD May 15 10:20:57.337000 audit: BPF prog-id=11 op=LOAD May 15 10:20:57.337000 audit: BPF prog-id=11 op=UNLOAD May 15 10:20:57.380000 audit[929]: AVC avc: denied { associate } for pid=929 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 10:20:57.380000 audit[929]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014d89c a1=40000d0de0 a2=40000d7040 a3=32 items=0 ppid=912 pid=929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:57.380000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:20:57.381000 audit[929]: AVC avc: denied { associate } for pid=929 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 10:20:57.381000 audit[929]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=400014d979 a2=1ed a3=0 items=2 ppid=912 pid=929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:57.381000 audit: CWD cwd="/" May 15 10:20:57.381000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:20:57.381000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:20:57.381000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:20:59.098000 audit: BPF prog-id=12 op=LOAD May 15 10:20:59.098000 audit: BPF prog-id=3 op=UNLOAD May 15 10:20:59.098000 audit: BPF prog-id=13 op=LOAD May 15 10:20:59.098000 audit: BPF prog-id=14 op=LOAD May 15 10:20:59.098000 audit: BPF prog-id=4 op=UNLOAD May 15 10:20:59.098000 audit: BPF prog-id=5 op=UNLOAD May 15 10:20:59.100000 audit: BPF prog-id=15 op=LOAD May 15 10:20:59.100000 audit: BPF prog-id=12 op=UNLOAD May 15 10:20:59.100000 audit: BPF prog-id=16 op=LOAD May 15 10:20:59.100000 audit: BPF prog-id=17 op=LOAD May 15 10:20:59.100000 audit: BPF prog-id=13 op=UNLOAD May 15 10:20:59.100000 audit: BPF prog-id=14 op=UNLOAD May 15 10:20:59.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.112000 audit: BPF prog-id=15 op=UNLOAD May 15 10:20:59.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.210000 audit: BPF prog-id=18 op=LOAD May 15 10:20:59.210000 audit: BPF prog-id=19 op=LOAD May 15 10:20:59.210000 audit: BPF prog-id=20 op=LOAD May 15 10:20:59.210000 audit: BPF prog-id=16 op=UNLOAD May 15 10:20:59.210000 audit: BPF prog-id=17 op=UNLOAD May 15 10:20:59.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.230000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 10:20:59.230000 audit[998]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffc7c84070 a2=4000 a3=1 items=0 ppid=1 pid=998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:59.230000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 10:20:57.377904 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:57Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:20:59.097585 systemd[1]: Queued start job for default target multi-user.target. May 15 10:20:57.378248 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:57Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:20:59.097598 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 10:20:57.378269 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:57Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:20:59.101273 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 10:20:57.378300 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:57Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 10:20:59.236650 systemd[1]: Mounted sys-kernel-debug.mount. May 15 10:20:59.236693 systemd[1]: Started systemd-journald.service. May 15 10:20:57.378320 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:57Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 10:20:57.378354 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:57Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 10:20:57.378367 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:57Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 10:20:57.378570 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:57Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 10:20:57.378604 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:57Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:20:57.378616 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:57Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:20:57.380021 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:57Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 10:20:57.380058 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:57Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 10:20:57.380077 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:57Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 May 15 10:20:57.380090 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:57Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 10:20:57.380110 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:57Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 May 15 10:20:57.380122 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:57Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 10:20:58.826655 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:58Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:20:58.826916 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:58Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:20:58.827021 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:58Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:20:59.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:58.827207 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:58Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:20:58.827257 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:58Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 10:20:58.827324 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2025-05-15T10:20:58Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 10:20:59.238267 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 10:20:59.239183 systemd[1]: Mounted tmp.mount. May 15 10:20:59.240222 systemd[1]: Finished kmod-static-nodes.service. May 15 10:20:59.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.241413 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 10:20:59.241571 systemd[1]: Finished modprobe@configfs.service. May 15 10:20:59.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.242631 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:20:59.242799 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:20:59.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.243854 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:20:59.244000 systemd[1]: Finished modprobe@drm.service. May 15 10:20:59.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.245089 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:20:59.245243 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:20:59.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.246529 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 10:20:59.246730 systemd[1]: Finished modprobe@fuse.service. May 15 10:20:59.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.247893 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:20:59.248050 systemd[1]: Finished modprobe@loop.service. May 15 10:20:59.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.249182 systemd[1]: Finished flatcar-tmpfiles.service. May 15 10:20:59.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.250398 systemd[1]: Finished systemd-modules-load.service. May 15 10:20:59.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.251532 systemd[1]: Finished systemd-network-generator.service. May 15 10:20:59.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.252752 systemd[1]: Finished systemd-remount-fs.service. May 15 10:20:59.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.254015 systemd[1]: Reached target network-pre.target. May 15 10:20:59.256318 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 10:20:59.258101 systemd[1]: Mounting sys-kernel-config.mount... May 15 10:20:59.259086 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 10:20:59.261895 systemd[1]: Starting systemd-hwdb-update.service... May 15 10:20:59.263762 systemd[1]: Starting systemd-journal-flush.service... May 15 10:20:59.264658 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:20:59.265654 systemd[1]: Starting systemd-random-seed.service... May 15 10:20:59.266521 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:20:59.267670 systemd[1]: Starting systemd-sysctl.service... May 15 10:20:59.269756 systemd[1]: Starting systemd-sysusers.service... May 15 10:20:59.272496 systemd-journald[998]: Time spent on flushing to /var/log/journal/da2e5d67d6bb442f9a9dd2b887753b44 is 13.770ms for 998 entries. May 15 10:20:59.272496 systemd-journald[998]: System Journal (/var/log/journal/da2e5d67d6bb442f9a9dd2b887753b44) is 8.0M, max 195.6M, 187.6M free. May 15 10:20:59.303216 systemd-journald[998]: Received client request to flush runtime journal. May 15 10:20:59.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.273325 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:20:59.305946 udevadm[1030]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 15 10:20:59.275331 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 10:20:59.276288 systemd[1]: Mounted sys-kernel-config.mount. May 15 10:20:59.278395 systemd[1]: Starting systemd-udev-settle.service... May 15 10:20:59.285240 systemd[1]: Finished systemd-random-seed.service. May 15 10:20:59.286274 systemd[1]: Reached target first-boot-complete.target. May 15 10:20:59.294129 systemd[1]: Finished systemd-sysctl.service. May 15 10:20:59.301429 systemd[1]: Finished systemd-sysusers.service. May 15 10:20:59.303429 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:20:59.304594 systemd[1]: Finished systemd-journal-flush.service. May 15 10:20:59.321626 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:20:59.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.642060 systemd[1]: Finished systemd-hwdb-update.service. May 15 10:20:59.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.643000 audit: BPF prog-id=21 op=LOAD May 15 10:20:59.643000 audit: BPF prog-id=22 op=LOAD May 15 10:20:59.643000 audit: BPF prog-id=7 op=UNLOAD May 15 10:20:59.643000 audit: BPF prog-id=8 op=UNLOAD May 15 10:20:59.644411 systemd[1]: Starting systemd-udevd.service... May 15 10:20:59.663362 systemd-udevd[1035]: Using default interface naming scheme 'v252'. May 15 10:20:59.676414 systemd[1]: Started systemd-udevd.service. May 15 10:20:59.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.678000 audit: BPF prog-id=23 op=LOAD May 15 10:20:59.679503 systemd[1]: Starting systemd-networkd.service... May 15 10:20:59.691000 audit: BPF prog-id=24 op=LOAD May 15 10:20:59.691000 audit: BPF prog-id=25 op=LOAD May 15 10:20:59.691000 audit: BPF prog-id=26 op=LOAD May 15 10:20:59.692132 systemd[1]: Starting systemd-userdbd.service... May 15 10:20:59.695682 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 15 10:20:59.735541 systemd[1]: Started systemd-userdbd.service. May 15 10:20:59.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.760800 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:20:59.785549 systemd[1]: Finished systemd-udev-settle.service. May 15 10:20:59.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.787319 systemd-networkd[1043]: lo: Link UP May 15 10:20:59.787330 systemd-networkd[1043]: lo: Gained carrier May 15 10:20:59.787604 systemd[1]: Starting lvm2-activation-early.service... May 15 10:20:59.787671 systemd-networkd[1043]: Enumeration completed May 15 10:20:59.787772 systemd-networkd[1043]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:20:59.788578 systemd[1]: Started systemd-networkd.service. May 15 10:20:59.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.791110 systemd-networkd[1043]: eth0: Link UP May 15 10:20:59.791120 systemd-networkd[1043]: eth0: Gained carrier May 15 10:20:59.808193 lvm[1068]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:20:59.823311 systemd-networkd[1043]: eth0: DHCPv4 address 10.0.0.103/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:20:59.842066 systemd[1]: Finished lvm2-activation-early.service. May 15 10:20:59.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.843135 systemd[1]: Reached target cryptsetup.target. May 15 10:20:59.845086 systemd[1]: Starting lvm2-activation.service... May 15 10:20:59.848784 lvm[1069]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:20:59.890089 systemd[1]: Finished lvm2-activation.service. May 15 10:20:59.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.891083 systemd[1]: Reached target local-fs-pre.target. May 15 10:20:59.891941 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 10:20:59.891974 systemd[1]: Reached target local-fs.target. May 15 10:20:59.892773 systemd[1]: Reached target machines.target. May 15 10:20:59.894928 systemd[1]: Starting ldconfig.service... May 15 10:20:59.896047 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:20:59.896105 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:20:59.897069 systemd[1]: Starting systemd-boot-update.service... May 15 10:20:59.899332 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 10:20:59.901542 systemd[1]: Starting systemd-machine-id-commit.service... May 15 10:20:59.906397 systemd[1]: Starting systemd-sysext.service... May 15 10:20:59.907558 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1071 (bootctl) May 15 10:20:59.909050 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 10:20:59.916051 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 10:20:59.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.920813 systemd[1]: Unmounting usr-share-oem.mount... May 15 10:20:59.928053 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 10:20:59.928247 systemd[1]: Unmounted usr-share-oem.mount. May 15 10:20:59.973194 kernel: loop0: detected capacity change from 0 to 194096 May 15 10:20:59.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:59.982179 systemd[1]: Finished systemd-machine-id-commit.service. May 15 10:20:59.994184 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 10:21:00.017694 systemd-fsck[1080]: fsck.fat 4.2 (2021-01-31) May 15 10:21:00.017694 systemd-fsck[1080]: /dev/vda1: 236 files, 117182/258078 clusters May 15 10:21:00.018188 kernel: loop1: detected capacity change from 0 to 194096 May 15 10:21:00.018697 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 10:21:00.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.029782 (sd-sysext)[1083]: Using extensions 'kubernetes'. May 15 10:21:00.030474 (sd-sysext)[1083]: Merged extensions into '/usr'. May 15 10:21:00.047530 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:21:00.048697 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:21:00.050461 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:21:00.052810 systemd[1]: Starting modprobe@loop.service... May 15 10:21:00.054067 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:21:00.054235 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:21:00.054959 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:21:00.055075 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:21:00.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.056338 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:21:00.056450 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:21:00.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.057761 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:21:00.057864 systemd[1]: Finished modprobe@loop.service. May 15 10:21:00.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.059315 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:21:00.059420 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:21:00.154734 ldconfig[1070]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 10:21:00.158448 systemd[1]: Finished ldconfig.service. May 15 10:21:00.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.229809 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 10:21:00.231604 systemd[1]: Mounting boot.mount... May 15 10:21:00.233400 systemd[1]: Mounting usr-share-oem.mount... May 15 10:21:00.238099 systemd[1]: Mounted usr-share-oem.mount. May 15 10:21:00.240155 systemd[1]: Finished systemd-sysext.service. May 15 10:21:00.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.242211 systemd[1]: Mounted boot.mount. May 15 10:21:00.243914 systemd[1]: Starting ensure-sysext.service... May 15 10:21:00.245645 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 10:21:00.249932 systemd[1]: Finished systemd-boot-update.service. May 15 10:21:00.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.250988 systemd[1]: Reloading. May 15 10:21:00.255678 systemd-tmpfiles[1091]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 10:21:00.256990 systemd-tmpfiles[1091]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 10:21:00.258487 systemd-tmpfiles[1091]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 10:21:00.301870 /usr/lib/systemd/system-generators/torcx-generator[1113]: time="2025-05-15T10:21:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:21:00.302252 /usr/lib/systemd/system-generators/torcx-generator[1113]: time="2025-05-15T10:21:00Z" level=info msg="torcx already run" May 15 10:21:00.365859 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:21:00.365882 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:21:00.381276 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:21:00.421000 audit: BPF prog-id=27 op=LOAD May 15 10:21:00.421000 audit: BPF prog-id=23 op=UNLOAD May 15 10:21:00.422000 audit: BPF prog-id=28 op=LOAD May 15 10:21:00.422000 audit: BPF prog-id=24 op=UNLOAD May 15 10:21:00.422000 audit: BPF prog-id=29 op=LOAD May 15 10:21:00.422000 audit: BPF prog-id=30 op=LOAD May 15 10:21:00.422000 audit: BPF prog-id=25 op=UNLOAD May 15 10:21:00.422000 audit: BPF prog-id=26 op=UNLOAD May 15 10:21:00.423000 audit: BPF prog-id=31 op=LOAD May 15 10:21:00.423000 audit: BPF prog-id=32 op=LOAD May 15 10:21:00.423000 audit: BPF prog-id=21 op=UNLOAD May 15 10:21:00.423000 audit: BPF prog-id=22 op=UNLOAD May 15 10:21:00.424000 audit: BPF prog-id=33 op=LOAD May 15 10:21:00.424000 audit: BPF prog-id=18 op=UNLOAD May 15 10:21:00.424000 audit: BPF prog-id=34 op=LOAD May 15 10:21:00.424000 audit: BPF prog-id=35 op=LOAD May 15 10:21:00.424000 audit: BPF prog-id=19 op=UNLOAD May 15 10:21:00.424000 audit: BPF prog-id=20 op=UNLOAD May 15 10:21:00.427468 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 10:21:00.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.432146 systemd[1]: Starting audit-rules.service... May 15 10:21:00.434106 systemd[1]: Starting clean-ca-certificates.service... May 15 10:21:00.436432 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 10:21:00.439000 audit: BPF prog-id=36 op=LOAD May 15 10:21:00.440598 systemd[1]: Starting systemd-resolved.service... May 15 10:21:00.443000 audit: BPF prog-id=37 op=LOAD May 15 10:21:00.444593 systemd[1]: Starting systemd-timesyncd.service... May 15 10:21:00.446754 systemd[1]: Starting systemd-update-utmp.service... May 15 10:21:00.448375 systemd[1]: Finished clean-ca-certificates.service. May 15 10:21:00.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.451248 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:21:00.453015 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:21:00.456000 audit[1161]: SYSTEM_BOOT pid=1161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 10:21:00.454543 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:21:00.456928 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:21:00.459144 systemd[1]: Starting modprobe@loop.service... May 15 10:21:00.460114 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:21:00.460331 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:21:00.460457 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:21:00.461497 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:21:00.461709 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:21:00.463079 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:21:00.463219 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:21:00.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.464530 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:21:00.464634 systemd[1]: Finished modprobe@loop.service. May 15 10:21:00.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.467462 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:21:00.467616 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:21:00.469446 systemd[1]: Finished systemd-update-utmp.service. May 15 10:21:00.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.471336 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:21:00.472777 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:21:00.475214 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:21:00.477656 systemd[1]: Starting modprobe@loop.service... May 15 10:21:00.478748 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:21:00.478884 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:21:00.478974 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:21:00.479751 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:21:00.479909 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:21:00.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.481366 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:21:00.481489 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:21:00.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.483132 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 10:21:00.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.484835 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:21:00.484961 systemd[1]: Finished modprobe@loop.service. May 15 10:21:00.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.489789 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:21:00.491664 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:21:00.494531 systemd[1]: Starting modprobe@drm.service... May 15 10:21:00.497003 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:21:00.505699 systemd[1]: Starting modprobe@loop.service... May 15 10:21:00.506799 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:21:00.507017 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:21:00.514355 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 10:21:00.517218 systemd[1]: Starting systemd-update-done.service... May 15 10:21:00.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.518642 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:21:00.520319 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:21:00.520510 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:21:00.521841 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:21:00.521957 systemd[1]: Finished modprobe@drm.service. May 15 10:21:00.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.523472 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:21:00.523624 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:21:00.524915 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:21:00.525031 systemd[1]: Finished modprobe@loop.service. May 15 10:21:00.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.530676 systemd[1]: Started systemd-timesyncd.service. May 15 10:21:00.531553 systemd-resolved[1154]: Positive Trust Anchors: May 15 10:21:00.531566 systemd-resolved[1154]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:21:00.531593 systemd-resolved[1154]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:21:00.532061 systemd-timesyncd[1160]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 15 10:21:00.532314 augenrules[1183]: No rules May 15 10:21:00.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:00.531000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 10:21:00.531000 audit[1183]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc0832e90 a2=420 a3=0 items=0 ppid=1150 pid=1183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:00.531000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 10:21:00.532693 systemd[1]: Finished systemd-update-done.service. May 15 10:21:00.532889 systemd-timesyncd[1160]: Initial clock synchronization to Thu 2025-05-15 10:21:00.391228 UTC. May 15 10:21:00.534235 systemd[1]: Finished audit-rules.service. May 15 10:21:00.535712 systemd[1]: Reached target time-set.target. May 15 10:21:00.536646 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:21:00.536696 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:21:00.537690 systemd[1]: Finished ensure-sysext.service. May 15 10:21:00.557554 systemd-resolved[1154]: Defaulting to hostname 'linux'. May 15 10:21:00.558979 systemd[1]: Started systemd-resolved.service. May 15 10:21:00.559886 systemd[1]: Reached target network.target. May 15 10:21:00.560701 systemd[1]: Reached target nss-lookup.target. May 15 10:21:00.561542 systemd[1]: Reached target sysinit.target. May 15 10:21:00.562376 systemd[1]: Started motdgen.path. May 15 10:21:00.563095 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 10:21:00.564394 systemd[1]: Started logrotate.timer. May 15 10:21:00.565289 systemd[1]: Started mdadm.timer. May 15 10:21:00.565953 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 10:21:00.566851 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 10:21:00.566888 systemd[1]: Reached target paths.target. May 15 10:21:00.567636 systemd[1]: Reached target timers.target. May 15 10:21:00.568689 systemd[1]: Listening on dbus.socket. May 15 10:21:00.570549 systemd[1]: Starting docker.socket... May 15 10:21:00.573996 systemd[1]: Listening on sshd.socket. May 15 10:21:00.574910 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:21:00.575375 systemd[1]: Listening on docker.socket. May 15 10:21:00.576240 systemd[1]: Reached target sockets.target. May 15 10:21:00.576983 systemd[1]: Reached target basic.target. May 15 10:21:00.577816 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:21:00.577865 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:21:00.578896 systemd[1]: Starting containerd.service... May 15 10:21:00.580771 systemd[1]: Starting dbus.service... May 15 10:21:00.582673 systemd[1]: Starting enable-oem-cloudinit.service... May 15 10:21:00.584626 systemd[1]: Starting extend-filesystems.service... May 15 10:21:00.585548 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 10:21:00.586771 systemd[1]: Starting motdgen.service... May 15 10:21:00.589865 jq[1193]: false May 15 10:21:00.588657 systemd[1]: Starting prepare-helm.service... May 15 10:21:00.591640 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 10:21:00.593687 systemd[1]: Starting sshd-keygen.service... May 15 10:21:00.596510 systemd[1]: Starting systemd-logind.service... May 15 10:21:00.597299 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:21:00.597362 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 10:21:00.597796 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 10:21:00.598491 systemd[1]: Starting update-engine.service... May 15 10:21:00.600493 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 10:21:00.605036 jq[1208]: true May 15 10:21:00.605696 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 10:21:00.605875 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 10:21:00.606904 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 10:21:00.607066 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 10:21:00.612544 extend-filesystems[1194]: Found loop1 May 15 10:21:00.612544 extend-filesystems[1194]: Found vda May 15 10:21:00.612544 extend-filesystems[1194]: Found vda1 May 15 10:21:00.615140 extend-filesystems[1194]: Found vda2 May 15 10:21:00.615140 extend-filesystems[1194]: Found vda3 May 15 10:21:00.615140 extend-filesystems[1194]: Found usr May 15 10:21:00.615140 extend-filesystems[1194]: Found vda4 May 15 10:21:00.615140 extend-filesystems[1194]: Found vda6 May 15 10:21:00.615140 extend-filesystems[1194]: Found vda7 May 15 10:21:00.615140 extend-filesystems[1194]: Found vda9 May 15 10:21:00.615140 extend-filesystems[1194]: Checking size of /dev/vda9 May 15 10:21:00.632701 jq[1215]: true May 15 10:21:00.633121 tar[1212]: linux-arm64/helm May 15 10:21:00.625826 systemd[1]: motdgen.service: Deactivated successfully. May 15 10:21:00.626009 systemd[1]: Finished motdgen.service. May 15 10:21:00.638991 dbus-daemon[1192]: [system] SELinux support is enabled May 15 10:21:00.639210 systemd[1]: Started dbus.service. May 15 10:21:00.641625 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 10:21:00.641646 systemd[1]: Reached target system-config.target. May 15 10:21:00.642591 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 10:21:00.642608 systemd[1]: Reached target user-config.target. May 15 10:21:00.644358 extend-filesystems[1194]: Resized partition /dev/vda9 May 15 10:21:00.654496 extend-filesystems[1229]: resize2fs 1.46.5 (30-Dec-2021) May 15 10:21:00.666318 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 15 10:21:00.672428 systemd-logind[1203]: Watching system buttons on /dev/input/event0 (Power Button) May 15 10:21:00.676876 systemd-logind[1203]: New seat seat0. May 15 10:21:00.682130 systemd[1]: Started systemd-logind.service. May 15 10:21:00.696516 systemd[1]: Started update-engine.service. May 15 10:21:00.701652 update_engine[1205]: I0515 10:21:00.693565 1205 main.cc:92] Flatcar Update Engine starting May 15 10:21:00.701652 update_engine[1205]: I0515 10:21:00.696616 1205 update_check_scheduler.cc:74] Next update check in 8m11s May 15 10:21:00.699359 systemd[1]: Started locksmithd.service. May 15 10:21:00.709181 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 15 10:21:00.727307 extend-filesystems[1229]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 10:21:00.727307 extend-filesystems[1229]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 10:21:00.727307 extend-filesystems[1229]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 15 10:21:00.732047 extend-filesystems[1194]: Resized filesystem in /dev/vda9 May 15 10:21:00.729635 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 10:21:00.733744 bash[1243]: Updated "/home/core/.ssh/authorized_keys" May 15 10:21:00.729788 systemd[1]: Finished extend-filesystems.service. May 15 10:21:00.731443 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 10:21:00.738427 env[1217]: time="2025-05-15T10:21:00.738376800Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 10:21:00.763656 locksmithd[1244]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 10:21:00.767438 env[1217]: time="2025-05-15T10:21:00.767386600Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 10:21:00.767616 env[1217]: time="2025-05-15T10:21:00.767594200Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 10:21:00.768911 env[1217]: time="2025-05-15T10:21:00.768877400Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 10:21:00.768942 env[1217]: time="2025-05-15T10:21:00.768911000Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 10:21:00.769296 env[1217]: time="2025-05-15T10:21:00.769261240Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:21:00.769373 env[1217]: time="2025-05-15T10:21:00.769351640Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 10:21:00.769402 env[1217]: time="2025-05-15T10:21:00.769377400Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 10:21:00.769402 env[1217]: time="2025-05-15T10:21:00.769389840Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 10:21:00.769487 env[1217]: time="2025-05-15T10:21:00.769469720Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 10:21:00.769898 env[1217]: time="2025-05-15T10:21:00.769870560Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 10:21:00.770200 env[1217]: time="2025-05-15T10:21:00.770155520Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:21:00.770235 env[1217]: time="2025-05-15T10:21:00.770199440Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 10:21:00.770286 env[1217]: time="2025-05-15T10:21:00.770261480Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 10:21:00.770327 env[1217]: time="2025-05-15T10:21:00.770286520Z" level=info msg="metadata content store policy set" policy=shared May 15 10:21:00.773368 env[1217]: time="2025-05-15T10:21:00.773340560Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 10:21:00.773402 env[1217]: time="2025-05-15T10:21:00.773385320Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 10:21:00.773474 env[1217]: time="2025-05-15T10:21:00.773454320Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 10:21:00.773510 env[1217]: time="2025-05-15T10:21:00.773500480Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 10:21:00.773532 env[1217]: time="2025-05-15T10:21:00.773515960Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 10:21:00.773552 env[1217]: time="2025-05-15T10:21:00.773530120Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 10:21:00.773659 env[1217]: time="2025-05-15T10:21:00.773542360Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 10:21:00.774118 env[1217]: time="2025-05-15T10:21:00.774090760Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 10:21:00.774211 env[1217]: time="2025-05-15T10:21:00.774125880Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 10:21:00.774251 env[1217]: time="2025-05-15T10:21:00.774218120Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 10:21:00.774251 env[1217]: time="2025-05-15T10:21:00.774233320Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 10:21:00.774251 env[1217]: time="2025-05-15T10:21:00.774247480Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 10:21:00.774437 env[1217]: time="2025-05-15T10:21:00.774414400Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 10:21:00.774594 env[1217]: time="2025-05-15T10:21:00.774573400Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 10:21:00.774981 env[1217]: time="2025-05-15T10:21:00.774959040Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 10:21:00.775015 env[1217]: time="2025-05-15T10:21:00.774993920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 10:21:00.775015 env[1217]: time="2025-05-15T10:21:00.775009080Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 10:21:00.775259 env[1217]: time="2025-05-15T10:21:00.775239920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 10:21:00.775293 env[1217]: time="2025-05-15T10:21:00.775263480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 10:21:00.775293 env[1217]: time="2025-05-15T10:21:00.775276520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 10:21:00.775334 env[1217]: time="2025-05-15T10:21:00.775308720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 10:21:00.775334 env[1217]: time="2025-05-15T10:21:00.775323880Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 10:21:00.775379 env[1217]: time="2025-05-15T10:21:00.775335480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 10:21:00.775379 env[1217]: time="2025-05-15T10:21:00.775347160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 10:21:00.775379 env[1217]: time="2025-05-15T10:21:00.775358040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 10:21:00.775379 env[1217]: time="2025-05-15T10:21:00.775370440Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 10:21:00.775569 env[1217]: time="2025-05-15T10:21:00.775545320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 10:21:00.775597 env[1217]: time="2025-05-15T10:21:00.775573000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 10:21:00.775597 env[1217]: time="2025-05-15T10:21:00.775586600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 10:21:00.775685 env[1217]: time="2025-05-15T10:21:00.775601520Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 10:21:00.775718 env[1217]: time="2025-05-15T10:21:00.775690640Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 10:21:00.775718 env[1217]: time="2025-05-15T10:21:00.775703400Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 10:21:00.775763 env[1217]: time="2025-05-15T10:21:00.775719760Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 10:21:00.775763 env[1217]: time="2025-05-15T10:21:00.775753560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 10:21:00.776107 env[1217]: time="2025-05-15T10:21:00.776051840Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 10:21:00.776693 env[1217]: time="2025-05-15T10:21:00.776114920Z" level=info msg="Connect containerd service" May 15 10:21:00.776693 env[1217]: time="2025-05-15T10:21:00.776224960Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 10:21:00.777394 env[1217]: time="2025-05-15T10:21:00.777366880Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:21:00.777621 env[1217]: time="2025-05-15T10:21:00.777589920Z" level=info msg="Start subscribing containerd event" May 15 10:21:00.777721 env[1217]: time="2025-05-15T10:21:00.777701640Z" level=info msg="Start recovering state" May 15 10:21:00.777791 env[1217]: time="2025-05-15T10:21:00.777775240Z" level=info msg="Start event monitor" May 15 10:21:00.777819 env[1217]: time="2025-05-15T10:21:00.777798320Z" level=info msg="Start snapshots syncer" May 15 10:21:00.777893 env[1217]: time="2025-05-15T10:21:00.777874600Z" level=info msg="Start cni network conf syncer for default" May 15 10:21:00.777923 env[1217]: time="2025-05-15T10:21:00.777892960Z" level=info msg="Start streaming server" May 15 10:21:00.779775 env[1217]: time="2025-05-15T10:21:00.779748000Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 10:21:00.779814 env[1217]: time="2025-05-15T10:21:00.779805240Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 10:21:00.779931 env[1217]: time="2025-05-15T10:21:00.779851920Z" level=info msg="containerd successfully booted in 0.059716s" May 15 10:21:00.779947 systemd[1]: Started containerd.service. May 15 10:21:01.014985 tar[1212]: linux-arm64/LICENSE May 15 10:21:01.015086 tar[1212]: linux-arm64/README.md May 15 10:21:01.019487 systemd[1]: Finished prepare-helm.service. May 15 10:21:01.049270 systemd-networkd[1043]: eth0: Gained IPv6LL May 15 10:21:01.051183 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 10:21:01.052497 systemd[1]: Reached target network-online.target. May 15 10:21:01.058102 systemd[1]: Starting kubelet.service... May 15 10:21:01.626842 systemd[1]: Started kubelet.service. May 15 10:21:02.140140 kubelet[1263]: E0515 10:21:02.140101 1263 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:21:02.141809 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:21:02.141943 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:21:03.455921 sshd_keygen[1210]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 10:21:03.473706 systemd[1]: Finished sshd-keygen.service. May 15 10:21:03.476081 systemd[1]: Starting issuegen.service... May 15 10:21:03.480723 systemd[1]: issuegen.service: Deactivated successfully. May 15 10:21:03.480886 systemd[1]: Finished issuegen.service. May 15 10:21:03.483058 systemd[1]: Starting systemd-user-sessions.service... May 15 10:21:03.488808 systemd[1]: Finished systemd-user-sessions.service. May 15 10:21:03.491107 systemd[1]: Started getty@tty1.service. May 15 10:21:03.493213 systemd[1]: Started serial-getty@ttyAMA0.service. May 15 10:21:03.494301 systemd[1]: Reached target getty.target. May 15 10:21:03.495182 systemd[1]: Reached target multi-user.target. May 15 10:21:03.497377 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 10:21:03.504290 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 10:21:03.504449 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 10:21:03.505520 systemd[1]: Startup finished in 573ms (kernel) + 4.631s (initrd) + 6.305s (userspace) = 11.511s. May 15 10:21:04.809012 systemd[1]: Created slice system-sshd.slice. May 15 10:21:04.810231 systemd[1]: Started sshd@0-10.0.0.103:22-10.0.0.1:46454.service. May 15 10:21:04.853713 sshd[1286]: Accepted publickey for core from 10.0.0.1 port 46454 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:21:04.855796 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:21:04.864534 systemd-logind[1203]: New session 1 of user core. May 15 10:21:04.866355 systemd[1]: Created slice user-500.slice. May 15 10:21:04.867501 systemd[1]: Starting user-runtime-dir@500.service... May 15 10:21:04.875681 systemd[1]: Finished user-runtime-dir@500.service. May 15 10:21:04.877080 systemd[1]: Starting user@500.service... May 15 10:21:04.879630 (systemd)[1289]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 10:21:04.935980 systemd[1289]: Queued start job for default target default.target. May 15 10:21:04.936398 systemd[1289]: Reached target paths.target. May 15 10:21:04.936430 systemd[1289]: Reached target sockets.target. May 15 10:21:04.936441 systemd[1289]: Reached target timers.target. May 15 10:21:04.936451 systemd[1289]: Reached target basic.target. May 15 10:21:04.936487 systemd[1289]: Reached target default.target. May 15 10:21:04.936510 systemd[1289]: Startup finished in 51ms. May 15 10:21:04.936699 systemd[1]: Started user@500.service. May 15 10:21:04.937992 systemd[1]: Started session-1.scope. May 15 10:21:04.988136 systemd[1]: Started sshd@1-10.0.0.103:22-10.0.0.1:46470.service. May 15 10:21:05.039442 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 46470 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:21:05.040629 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:21:05.044177 systemd-logind[1203]: New session 2 of user core. May 15 10:21:05.045391 systemd[1]: Started session-2.scope. May 15 10:21:05.098608 sshd[1298]: pam_unix(sshd:session): session closed for user core May 15 10:21:05.101064 systemd[1]: sshd@1-10.0.0.103:22-10.0.0.1:46470.service: Deactivated successfully. May 15 10:21:05.101690 systemd[1]: session-2.scope: Deactivated successfully. May 15 10:21:05.102170 systemd-logind[1203]: Session 2 logged out. Waiting for processes to exit. May 15 10:21:05.103157 systemd[1]: Started sshd@2-10.0.0.103:22-10.0.0.1:46484.service. May 15 10:21:05.103749 systemd-logind[1203]: Removed session 2. May 15 10:21:05.140651 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 46484 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:21:05.141722 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:21:05.144752 systemd-logind[1203]: New session 3 of user core. May 15 10:21:05.145494 systemd[1]: Started session-3.scope. May 15 10:21:05.193591 sshd[1304]: pam_unix(sshd:session): session closed for user core May 15 10:21:05.196867 systemd[1]: sshd@2-10.0.0.103:22-10.0.0.1:46484.service: Deactivated successfully. May 15 10:21:05.197427 systemd[1]: session-3.scope: Deactivated successfully. May 15 10:21:05.197941 systemd-logind[1203]: Session 3 logged out. Waiting for processes to exit. May 15 10:21:05.199002 systemd[1]: Started sshd@3-10.0.0.103:22-10.0.0.1:46500.service. May 15 10:21:05.199791 systemd-logind[1203]: Removed session 3. May 15 10:21:05.236674 sshd[1310]: Accepted publickey for core from 10.0.0.1 port 46500 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:21:05.238270 sshd[1310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:21:05.241597 systemd-logind[1203]: New session 4 of user core. May 15 10:21:05.242442 systemd[1]: Started session-4.scope. May 15 10:21:05.295983 sshd[1310]: pam_unix(sshd:session): session closed for user core May 15 10:21:05.299823 systemd[1]: Started sshd@4-10.0.0.103:22-10.0.0.1:46514.service. May 15 10:21:05.300427 systemd[1]: sshd@3-10.0.0.103:22-10.0.0.1:46500.service: Deactivated successfully. May 15 10:21:05.301131 systemd[1]: session-4.scope: Deactivated successfully. May 15 10:21:05.301823 systemd-logind[1203]: Session 4 logged out. Waiting for processes to exit. May 15 10:21:05.302772 systemd-logind[1203]: Removed session 4. May 15 10:21:05.337480 sshd[1315]: Accepted publickey for core from 10.0.0.1 port 46514 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:21:05.338693 sshd[1315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:21:05.342370 systemd-logind[1203]: New session 5 of user core. May 15 10:21:05.343390 systemd[1]: Started session-5.scope. May 15 10:21:05.403716 sudo[1319]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 10:21:05.404582 sudo[1319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:21:05.417347 dbus-daemon[1192]: avc: received setenforce notice (enforcing=1) May 15 10:21:05.418120 sudo[1319]: pam_unix(sudo:session): session closed for user root May 15 10:21:05.420522 sshd[1315]: pam_unix(sshd:session): session closed for user core May 15 10:21:05.423376 systemd[1]: sshd@4-10.0.0.103:22-10.0.0.1:46514.service: Deactivated successfully. May 15 10:21:05.423955 systemd[1]: session-5.scope: Deactivated successfully. May 15 10:21:05.424593 systemd-logind[1203]: Session 5 logged out. Waiting for processes to exit. May 15 10:21:05.425787 systemd[1]: Started sshd@5-10.0.0.103:22-10.0.0.1:46516.service. May 15 10:21:05.426576 systemd-logind[1203]: Removed session 5. May 15 10:21:05.464500 sshd[1323]: Accepted publickey for core from 10.0.0.1 port 46516 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:21:05.465774 sshd[1323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:21:05.469180 systemd-logind[1203]: New session 6 of user core. May 15 10:21:05.470012 systemd[1]: Started session-6.scope. May 15 10:21:05.522542 sudo[1327]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 10:21:05.522776 sudo[1327]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:21:05.525557 sudo[1327]: pam_unix(sudo:session): session closed for user root May 15 10:21:05.529878 sudo[1326]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 10:21:05.530922 sudo[1326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:21:05.539354 systemd[1]: Stopping audit-rules.service... May 15 10:21:05.539000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:21:05.541180 kernel: kauditd_printk_skb: 166 callbacks suppressed May 15 10:21:05.541212 kernel: audit: type=1305 audit(1747304465.539:210): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:21:05.542376 auditctl[1330]: No rules May 15 10:21:05.542718 systemd[1]: audit-rules.service: Deactivated successfully. May 15 10:21:05.539000 audit[1330]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffff19e7b0 a2=420 a3=0 items=0 ppid=1 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:05.542880 systemd[1]: Stopped audit-rules.service. May 15 10:21:05.544386 systemd[1]: Starting audit-rules.service... May 15 10:21:05.546247 kernel: audit: type=1300 audit(1747304465.539:210): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffff19e7b0 a2=420 a3=0 items=0 ppid=1 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:05.546303 kernel: audit: type=1327 audit(1747304465.539:210): proctitle=2F7362696E2F617564697463746C002D44 May 15 10:21:05.539000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 10:21:05.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:05.549802 kernel: audit: type=1131 audit(1747304465.541:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:05.561199 augenrules[1347]: No rules May 15 10:21:05.561938 systemd[1]: Finished audit-rules.service. May 15 10:21:05.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:05.562920 sudo[1326]: pam_unix(sudo:session): session closed for user root May 15 10:21:05.562000 audit[1326]: USER_END pid=1326 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:05.568111 kernel: audit: type=1130 audit(1747304465.561:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:05.568204 kernel: audit: type=1106 audit(1747304465.562:213): pid=1326 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:05.569050 sshd[1323]: pam_unix(sshd:session): session closed for user core May 15 10:21:05.562000 audit[1326]: CRED_DISP pid=1326 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:05.569499 systemd[1]: Started sshd@6-10.0.0.103:22-10.0.0.1:46528.service. May 15 10:21:05.571830 systemd[1]: sshd@5-10.0.0.103:22-10.0.0.1:46516.service: Deactivated successfully. May 15 10:21:05.572095 kernel: audit: type=1104 audit(1747304465.562:214): pid=1326 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:05.572142 kernel: audit: type=1130 audit(1747304465.568:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.103:22-10.0.0.1:46528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:05.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.103:22-10.0.0.1:46528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:05.572522 systemd[1]: session-6.scope: Deactivated successfully. May 15 10:21:05.573281 systemd-logind[1203]: Session 6 logged out. Waiting for processes to exit. May 15 10:21:05.573936 systemd-logind[1203]: Removed session 6. May 15 10:21:05.569000 audit[1323]: USER_END pid=1323 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:05.578283 kernel: audit: type=1106 audit(1747304465.569:216): pid=1323 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:05.578334 kernel: audit: type=1104 audit(1747304465.569:217): pid=1323 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:05.569000 audit[1323]: CRED_DISP pid=1323 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:05.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.103:22-10.0.0.1:46516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:05.614000 audit[1352]: USER_ACCT pid=1352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:05.615989 sshd[1352]: Accepted publickey for core from 10.0.0.1 port 46528 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:21:05.616000 audit[1352]: CRED_ACQ pid=1352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:05.616000 audit[1352]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc6986a90 a2=3 a3=1 items=0 ppid=1 pid=1352 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:05.616000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:21:05.617723 sshd[1352]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:21:05.621914 systemd[1]: Started session-7.scope. May 15 10:21:05.622228 systemd-logind[1203]: New session 7 of user core. May 15 10:21:05.624000 audit[1352]: USER_START pid=1352 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:05.626000 audit[1355]: CRED_ACQ pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:05.672000 audit[1356]: USER_ACCT pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:05.672000 audit[1356]: CRED_REFR pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:05.673779 sudo[1356]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 10:21:05.674003 sudo[1356]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:21:05.674000 audit[1356]: USER_START pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:05.737127 systemd[1]: Starting docker.service... May 15 10:21:05.833357 env[1368]: time="2025-05-15T10:21:05.833304797Z" level=info msg="Starting up" May 15 10:21:05.834850 env[1368]: time="2025-05-15T10:21:05.834827656Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:21:05.834850 env[1368]: time="2025-05-15T10:21:05.834848994Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:21:05.834912 env[1368]: time="2025-05-15T10:21:05.834868828Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:21:05.834912 env[1368]: time="2025-05-15T10:21:05.834879714Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:21:05.838747 env[1368]: time="2025-05-15T10:21:05.838718019Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:21:05.838747 env[1368]: time="2025-05-15T10:21:05.838741019Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:21:05.838856 env[1368]: time="2025-05-15T10:21:05.838757290Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:21:05.838856 env[1368]: time="2025-05-15T10:21:05.838766830Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:21:05.973516 env[1368]: time="2025-05-15T10:21:05.973353448Z" level=info msg="Loading containers: start." May 15 10:21:06.018000 audit[1402]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.018000 audit[1402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffffd15a1e0 a2=0 a3=1 items=0 ppid=1368 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.018000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 15 10:21:06.023000 audit[1404]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.023000 audit[1404]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffcb905cf0 a2=0 a3=1 items=0 ppid=1368 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.023000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 15 10:21:06.024000 audit[1406]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.024000 audit[1406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffffbdd9ac0 a2=0 a3=1 items=0 ppid=1368 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.024000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:21:06.026000 audit[1408]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.026000 audit[1408]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffffff4cb10 a2=0 a3=1 items=0 ppid=1368 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.026000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:21:06.030000 audit[1410]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.030000 audit[1410]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd9d7ff40 a2=0 a3=1 items=0 ppid=1368 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.030000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 15 10:21:06.052000 audit[1415]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.052000 audit[1415]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff8720570 a2=0 a3=1 items=0 ppid=1368 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.052000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 15 10:21:06.057000 audit[1417]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.057000 audit[1417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc3b14b80 a2=0 a3=1 items=0 ppid=1368 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.057000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 15 10:21:06.059000 audit[1419]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.059000 audit[1419]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffdbc02f20 a2=0 a3=1 items=0 ppid=1368 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.059000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 15 10:21:06.060000 audit[1421]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.060000 audit[1421]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffd049d770 a2=0 a3=1 items=0 ppid=1368 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.060000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:21:06.066000 audit[1425]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.066000 audit[1425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffdecc0120 a2=0 a3=1 items=0 ppid=1368 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.066000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:21:06.080000 audit[1426]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.080000 audit[1426]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff1d10ee0 a2=0 a3=1 items=0 ppid=1368 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.080000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:21:06.091696 kernel: Initializing XFRM netlink socket May 15 10:21:06.113929 env[1368]: time="2025-05-15T10:21:06.113885871Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 15 10:21:06.128000 audit[1434]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.128000 audit[1434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=fffff93a2720 a2=0 a3=1 items=0 ppid=1368 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.128000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 15 10:21:06.142000 audit[1437]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.142000 audit[1437]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffe30f1450 a2=0 a3=1 items=0 ppid=1368 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.142000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 15 10:21:06.146000 audit[1440]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.146000 audit[1440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff65d3a60 a2=0 a3=1 items=0 ppid=1368 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.146000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 15 10:21:06.148000 audit[1442]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.148000 audit[1442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffffdbb050 a2=0 a3=1 items=0 ppid=1368 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.148000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 15 10:21:06.150000 audit[1444]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.150000 audit[1444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffe0cd01f0 a2=0 a3=1 items=0 ppid=1368 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.150000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 15 10:21:06.152000 audit[1446]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.152000 audit[1446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffe5106ec0 a2=0 a3=1 items=0 ppid=1368 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.152000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 15 10:21:06.154000 audit[1448]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.154000 audit[1448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffd1491ad0 a2=0 a3=1 items=0 ppid=1368 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.154000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 15 10:21:06.160000 audit[1451]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.160000 audit[1451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffd0052f80 a2=0 a3=1 items=0 ppid=1368 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.160000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 15 10:21:06.162000 audit[1453]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.162000 audit[1453]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffd1b0b040 a2=0 a3=1 items=0 ppid=1368 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.162000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:21:06.163000 audit[1455]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.163000 audit[1455]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffd86af9a0 a2=0 a3=1 items=0 ppid=1368 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.163000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:21:06.164000 audit[1457]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.164000 audit[1457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff7f78bd0 a2=0 a3=1 items=0 ppid=1368 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.164000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 15 10:21:06.166240 systemd-networkd[1043]: docker0: Link UP May 15 10:21:06.172000 audit[1461]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.172000 audit[1461]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe3318130 a2=0 a3=1 items=0 ppid=1368 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.172000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:21:06.181000 audit[1462]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:06.181000 audit[1462]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffeeb69720 a2=0 a3=1 items=0 ppid=1368 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:06.181000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:21:06.183392 env[1368]: time="2025-05-15T10:21:06.183353396Z" level=info msg="Loading containers: done." May 15 10:21:06.201685 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4283372418-merged.mount: Deactivated successfully. May 15 10:21:06.206435 env[1368]: time="2025-05-15T10:21:06.206396041Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 15 10:21:06.206573 env[1368]: time="2025-05-15T10:21:06.206549564Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 15 10:21:06.206650 env[1368]: time="2025-05-15T10:21:06.206636176Z" level=info msg="Daemon has completed initialization" May 15 10:21:06.220731 systemd[1]: Started docker.service. May 15 10:21:06.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:06.226858 env[1368]: time="2025-05-15T10:21:06.226767676Z" level=info msg="API listen on /run/docker.sock" May 15 10:21:06.909086 env[1217]: time="2025-05-15T10:21:06.909027160Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 15 10:21:07.484441 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4187926315.mount: Deactivated successfully. May 15 10:21:09.070864 env[1217]: time="2025-05-15T10:21:09.070811507Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:09.072129 env[1217]: time="2025-05-15T10:21:09.072101506Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afbe230ec4abc2c9e87f7fbe7814bde21dbe30f03252c8861c4ca9510cb43ec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:09.074035 env[1217]: time="2025-05-15T10:21:09.073998335Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:09.075676 env[1217]: time="2025-05-15T10:21:09.075649498Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:09.076597 env[1217]: time="2025-05-15T10:21:09.076569665Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:afbe230ec4abc2c9e87f7fbe7814bde21dbe30f03252c8861c4ca9510cb43ec6\"" May 15 10:21:09.085471 env[1217]: time="2025-05-15T10:21:09.085433106Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 15 10:21:10.698833 env[1217]: time="2025-05-15T10:21:10.698780383Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:10.702038 env[1217]: time="2025-05-15T10:21:10.702006596Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3df23260c56ff58d759f8a841c67846184e97ce81a269549ca8d14b36da14c14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:10.703926 env[1217]: time="2025-05-15T10:21:10.703892373Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:10.706491 env[1217]: time="2025-05-15T10:21:10.706458654Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:10.706801 env[1217]: time="2025-05-15T10:21:10.706769164Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:3df23260c56ff58d759f8a841c67846184e97ce81a269549ca8d14b36da14c14\"" May 15 10:21:10.718546 env[1217]: time="2025-05-15T10:21:10.718524764Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 15 10:21:11.804051 env[1217]: time="2025-05-15T10:21:11.804001526Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:11.806579 env[1217]: time="2025-05-15T10:21:11.806541919Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fb0f5dac5fa74463b801d11598454c00462609b582d17052195012e5f682c2ba,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:11.808880 env[1217]: time="2025-05-15T10:21:11.808846011Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:11.810927 env[1217]: time="2025-05-15T10:21:11.810897636Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:11.811714 env[1217]: time="2025-05-15T10:21:11.811683743Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:fb0f5dac5fa74463b801d11598454c00462609b582d17052195012e5f682c2ba\"" May 15 10:21:11.820462 env[1217]: time="2025-05-15T10:21:11.820426312Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 15 10:21:12.392706 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 10:21:12.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:12.392897 systemd[1]: Stopped kubelet.service. May 15 10:21:12.393646 kernel: kauditd_printk_skb: 84 callbacks suppressed May 15 10:21:12.393701 kernel: audit: type=1130 audit(1747304472.391:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:12.394448 systemd[1]: Starting kubelet.service... May 15 10:21:12.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:12.403176 kernel: audit: type=1131 audit(1747304472.391:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:12.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:12.481244 systemd[1]: Started kubelet.service. May 15 10:21:12.486194 kernel: audit: type=1130 audit(1747304472.480:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:12.530206 kubelet[1530]: E0515 10:21:12.530135 1530 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:21:12.532946 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:21:12.533084 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:21:12.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:21:12.536191 kernel: audit: type=1131 audit(1747304472.532:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:21:12.990002 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3503180694.mount: Deactivated successfully. May 15 10:21:13.503270 env[1217]: time="2025-05-15T10:21:13.503222916Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:13.504765 env[1217]: time="2025-05-15T10:21:13.504718799Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b4250a9efcae16f8d20358e204a159844e2b7e854edad08aee8791774acbdaed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:13.506007 env[1217]: time="2025-05-15T10:21:13.505978602Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:13.507212 env[1217]: time="2025-05-15T10:21:13.507180011Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:13.507815 env[1217]: time="2025-05-15T10:21:13.507785898Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:b4250a9efcae16f8d20358e204a159844e2b7e854edad08aee8791774acbdaed\"" May 15 10:21:13.516006 env[1217]: time="2025-05-15T10:21:13.515969849Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 15 10:21:14.084815 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount542029016.mount: Deactivated successfully. May 15 10:21:15.058231 env[1217]: time="2025-05-15T10:21:15.058182094Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:15.059893 env[1217]: time="2025-05-15T10:21:15.059864400Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:15.062598 env[1217]: time="2025-05-15T10:21:15.062563900Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:15.064233 env[1217]: time="2025-05-15T10:21:15.064201487Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:15.065147 env[1217]: time="2025-05-15T10:21:15.065114325Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" May 15 10:21:15.074366 env[1217]: time="2025-05-15T10:21:15.074314828Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 15 10:21:15.527353 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount11663223.mount: Deactivated successfully. May 15 10:21:15.531426 env[1217]: time="2025-05-15T10:21:15.531386637Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:15.532712 env[1217]: time="2025-05-15T10:21:15.532686662Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:15.533999 env[1217]: time="2025-05-15T10:21:15.533970890Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:15.535355 env[1217]: time="2025-05-15T10:21:15.535331191Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:15.535893 env[1217]: time="2025-05-15T10:21:15.535868730Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" May 15 10:21:15.545457 env[1217]: time="2025-05-15T10:21:15.545427778Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 15 10:21:16.011850 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2940934253.mount: Deactivated successfully. May 15 10:21:18.164108 env[1217]: time="2025-05-15T10:21:18.164059953Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:18.165605 env[1217]: time="2025-05-15T10:21:18.165582302Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:014faa467e29798aeef733fe6d1a3b5e382688217b053ad23410e6cccd5d22fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:18.167532 env[1217]: time="2025-05-15T10:21:18.167508357Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:18.169415 env[1217]: time="2025-05-15T10:21:18.169384303Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:18.171040 env[1217]: time="2025-05-15T10:21:18.171011462Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:014faa467e29798aeef733fe6d1a3b5e382688217b053ad23410e6cccd5d22fd\"" May 15 10:21:22.559953 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 10:21:22.560131 systemd[1]: Stopped kubelet.service. May 15 10:21:22.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:22.561486 systemd[1]: Starting kubelet.service... May 15 10:21:22.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:22.565349 kernel: audit: type=1130 audit(1747304482.558:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:22.565413 kernel: audit: type=1131 audit(1747304482.559:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:22.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:22.657072 systemd[1]: Started kubelet.service. May 15 10:21:22.660182 kernel: audit: type=1130 audit(1747304482.656:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:22.707015 kubelet[1644]: E0515 10:21:22.706941 1644 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:21:22.709773 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:21:22.709912 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:21:22.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:21:22.713187 kernel: audit: type=1131 audit(1747304482.708:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:21:24.289686 systemd[1]: Stopped kubelet.service. May 15 10:21:24.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:24.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:24.291626 systemd[1]: Starting kubelet.service... May 15 10:21:24.297061 kernel: audit: type=1130 audit(1747304484.288:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:24.297150 kernel: audit: type=1131 audit(1747304484.288:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:24.315775 systemd[1]: Reloading. May 15 10:21:24.367983 /usr/lib/systemd/system-generators/torcx-generator[1680]: time="2025-05-15T10:21:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:21:24.368357 /usr/lib/systemd/system-generators/torcx-generator[1680]: time="2025-05-15T10:21:24Z" level=info msg="torcx already run" May 15 10:21:24.527383 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:21:24.527400 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:21:24.542524 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:21:24.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.594308 kernel: audit: type=1400 audit(1747304484.588:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.594391 kernel: audit: type=1400 audit(1747304484.588:263): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.594417 kernel: audit: type=1400 audit(1747304484.588:264): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598797 kernel: audit: type=1400 audit(1747304484.588:265): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.590000 audit: BPF prog-id=43 op=LOAD May 15 10:21:24.590000 audit: BPF prog-id=38 op=UNLOAD May 15 10:21:24.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.593000 audit: BPF prog-id=44 op=LOAD May 15 10:21:24.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.595000 audit: BPF prog-id=45 op=LOAD May 15 10:21:24.595000 audit: BPF prog-id=39 op=UNLOAD May 15 10:21:24.595000 audit: BPF prog-id=40 op=UNLOAD May 15 10:21:24.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.597000 audit: BPF prog-id=46 op=LOAD May 15 10:21:24.597000 audit: BPF prog-id=27 op=UNLOAD May 15 10:21:24.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit: BPF prog-id=47 op=LOAD May 15 10:21:24.598000 audit: BPF prog-id=28 op=UNLOAD May 15 10:21:24.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit: BPF prog-id=48 op=LOAD May 15 10:21:24.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.598000 audit: BPF prog-id=49 op=LOAD May 15 10:21:24.598000 audit: BPF prog-id=29 op=UNLOAD May 15 10:21:24.598000 audit: BPF prog-id=30 op=UNLOAD May 15 10:21:24.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.599000 audit: BPF prog-id=50 op=LOAD May 15 10:21:24.599000 audit: BPF prog-id=37 op=UNLOAD May 15 10:21:24.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit: BPF prog-id=51 op=LOAD May 15 10:21:24.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.600000 audit: BPF prog-id=52 op=LOAD May 15 10:21:24.600000 audit: BPF prog-id=31 op=UNLOAD May 15 10:21:24.600000 audit: BPF prog-id=32 op=UNLOAD May 15 10:21:24.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit: BPF prog-id=53 op=LOAD May 15 10:21:24.601000 audit: BPF prog-id=33 op=UNLOAD May 15 10:21:24.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit: BPF prog-id=54 op=LOAD May 15 10:21:24.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.601000 audit: BPF prog-id=55 op=LOAD May 15 10:21:24.601000 audit: BPF prog-id=34 op=UNLOAD May 15 10:21:24.601000 audit: BPF prog-id=35 op=UNLOAD May 15 10:21:24.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.603000 audit: BPF prog-id=56 op=LOAD May 15 10:21:24.603000 audit: BPF prog-id=36 op=UNLOAD May 15 10:21:24.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:24.604000 audit: BPF prog-id=57 op=LOAD May 15 10:21:24.604000 audit: BPF prog-id=41 op=UNLOAD May 15 10:21:24.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:24.614551 systemd[1]: Started kubelet.service. May 15 10:21:24.615735 systemd[1]: Stopping kubelet.service... May 15 10:21:24.615971 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:21:24.616131 systemd[1]: Stopped kubelet.service. May 15 10:21:24.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:24.617600 systemd[1]: Starting kubelet.service... May 15 10:21:24.703896 systemd[1]: Started kubelet.service. May 15 10:21:24.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:24.743277 kubelet[1723]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:21:24.743277 kubelet[1723]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 10:21:24.743277 kubelet[1723]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:21:24.747426 kubelet[1723]: I0515 10:21:24.746431 1723 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:21:25.628668 kubelet[1723]: I0515 10:21:25.628623 1723 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 15 10:21:25.628668 kubelet[1723]: I0515 10:21:25.628654 1723 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:21:25.628881 kubelet[1723]: I0515 10:21:25.628849 1723 server.go:927] "Client rotation is on, will bootstrap in background" May 15 10:21:25.644192 kubelet[1723]: I0515 10:21:25.644078 1723 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:21:25.644704 kubelet[1723]: E0515 10:21:25.644466 1723 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.103:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.103:6443: connect: connection refused May 15 10:21:25.652614 kubelet[1723]: I0515 10:21:25.652589 1723 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:21:25.652979 kubelet[1723]: I0515 10:21:25.652948 1723 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:21:25.653138 kubelet[1723]: I0515 10:21:25.652975 1723 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 15 10:21:25.653231 kubelet[1723]: I0515 10:21:25.653216 1723 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:21:25.653231 kubelet[1723]: I0515 10:21:25.653225 1723 container_manager_linux.go:301] "Creating device plugin manager" May 15 10:21:25.653508 kubelet[1723]: I0515 10:21:25.653483 1723 state_mem.go:36] "Initialized new in-memory state store" May 15 10:21:25.654453 kubelet[1723]: I0515 10:21:25.654432 1723 kubelet.go:400] "Attempting to sync node with API server" May 15 10:21:25.654491 kubelet[1723]: I0515 10:21:25.654454 1723 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:21:25.654787 kubelet[1723]: I0515 10:21:25.654768 1723 kubelet.go:312] "Adding apiserver pod source" May 15 10:21:25.654958 kubelet[1723]: I0515 10:21:25.654942 1723 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:21:25.655183 kubelet[1723]: W0515 10:21:25.655120 1723 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.103:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.103:6443: connect: connection refused May 15 10:21:25.655300 kubelet[1723]: E0515 10:21:25.655285 1723 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.103:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.103:6443: connect: connection refused May 15 10:21:25.655481 kubelet[1723]: W0515 10:21:25.655444 1723 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.103:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.103:6443: connect: connection refused May 15 10:21:25.655546 kubelet[1723]: E0515 10:21:25.655491 1723 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.103:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.103:6443: connect: connection refused May 15 10:21:25.655842 kubelet[1723]: I0515 10:21:25.655798 1723 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:21:25.656163 kubelet[1723]: I0515 10:21:25.656148 1723 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:21:25.656279 kubelet[1723]: W0515 10:21:25.656267 1723 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 10:21:25.657023 kubelet[1723]: I0515 10:21:25.657007 1723 server.go:1264] "Started kubelet" May 15 10:21:25.687151 kubelet[1723]: I0515 10:21:25.687116 1723 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:21:25.692422 kubelet[1723]: I0515 10:21:25.692372 1723 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:21:25.692732 kubelet[1723]: I0515 10:21:25.692715 1723 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:21:25.694056 kubelet[1723]: I0515 10:21:25.694011 1723 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:21:25.694056 kubelet[1723]: I0515 10:21:25.694053 1723 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 10:21:25.694170 kubelet[1723]: I0515 10:21:25.694104 1723 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:21:25.694658 kubelet[1723]: I0515 10:21:25.694636 1723 server.go:455] "Adding debug handlers to kubelet server" May 15 10:21:25.693000 audit[1723]: AVC avc: denied { mac_admin } for pid=1723 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:25.693000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:21:25.693000 audit[1723]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400069fe60 a1=400084e780 a2=400069fe30 a3=25 items=0 ppid=1 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:25.693000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:21:25.693000 audit[1723]: AVC avc: denied { mac_admin } for pid=1723 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:25.693000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:21:25.693000 audit[1723]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400050ec40 a1=400084e798 a2=400069fef0 a3=25 items=0 ppid=1 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:25.693000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:21:25.696202 kubelet[1723]: E0515 10:21:25.696035 1723 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:21:25.696202 kubelet[1723]: I0515 10:21:25.696132 1723 volume_manager.go:291] "Starting Kubelet Volume Manager" May 15 10:21:25.696302 kubelet[1723]: I0515 10:21:25.696260 1723 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 10:21:25.696401 kubelet[1723]: I0515 10:21:25.696375 1723 reconciler.go:26] "Reconciler: start to sync state" May 15 10:21:25.696700 kubelet[1723]: W0515 10:21:25.696656 1723 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.103:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.103:6443: connect: connection refused May 15 10:21:25.696799 kubelet[1723]: E0515 10:21:25.696701 1723 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.103:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.103:6443: connect: connection refused May 15 10:21:25.696000 audit[1735]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:25.696000 audit[1735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdff35290 a2=0 a3=1 items=0 ppid=1723 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:25.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:21:25.697275 kubelet[1723]: E0515 10:21:25.696967 1723 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.103:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.103:6443: connect: connection refused" interval="200ms" May 15 10:21:25.697275 kubelet[1723]: E0515 10:21:25.697118 1723 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:21:25.697499 kubelet[1723]: I0515 10:21:25.697478 1723 factory.go:221] Registration of the systemd container factory successfully May 15 10:21:25.697580 kubelet[1723]: I0515 10:21:25.697565 1723 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:21:25.697000 audit[1736]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:25.697000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd0fb060 a2=0 a3=1 items=0 ppid=1723 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:25.697000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:21:25.699041 kubelet[1723]: I0515 10:21:25.699004 1723 factory.go:221] Registration of the containerd container factory successfully May 15 10:21:25.700817 kubelet[1723]: E0515 10:21:25.698899 1723 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.103:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.103:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183fac2c0e07f1d3 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 10:21:25.656981971 +0000 UTC m=+0.949751872,LastTimestamp:2025-05-15 10:21:25.656981971 +0000 UTC m=+0.949751872,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 10:21:25.707000 audit[1741]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:25.707000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc17d02d0 a2=0 a3=1 items=0 ppid=1723 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:25.707000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:21:25.709000 audit[1744]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:25.709000 audit[1744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffa5c1720 a2=0 a3=1 items=0 ppid=1723 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:25.709000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:21:25.711486 kubelet[1723]: I0515 10:21:25.711460 1723 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 10:21:25.711599 kubelet[1723]: I0515 10:21:25.711492 1723 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 10:21:25.711599 kubelet[1723]: I0515 10:21:25.711513 1723 state_mem.go:36] "Initialized new in-memory state store" May 15 10:21:25.715000 audit[1748]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:25.715000 audit[1748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd67cdbe0 a2=0 a3=1 items=0 ppid=1723 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:25.715000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 10:21:25.715961 kubelet[1723]: I0515 10:21:25.715927 1723 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:21:25.716000 audit[1750]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:25.716000 audit[1750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff25dae80 a2=0 a3=1 items=0 ppid=1723 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:25.716000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:21:25.717023 kubelet[1723]: I0515 10:21:25.717002 1723 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:21:25.717101 kubelet[1723]: I0515 10:21:25.717092 1723 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 10:21:25.717329 kubelet[1723]: I0515 10:21:25.717315 1723 kubelet.go:2337] "Starting kubelet main sync loop" May 15 10:21:25.717471 kubelet[1723]: E0515 10:21:25.717452 1723 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:21:25.717000 audit[1752]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:25.717000 audit[1752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc5cee700 a2=0 a3=1 items=0 ppid=1723 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:25.717000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:21:25.718714 kubelet[1723]: W0515 10:21:25.718669 1723 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.103:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.103:6443: connect: connection refused May 15 10:21:25.718000 audit[1753]: NETFILTER_CFG table=nat:33 family=10 entries=2 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:25.718000 audit[1753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe85802b0 a2=0 a3=1 items=0 ppid=1723 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:25.718000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:21:25.719128 kubelet[1723]: E0515 10:21:25.719111 1723 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.103:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.103:6443: connect: connection refused May 15 10:21:25.719000 audit[1751]: NETFILTER_CFG table=mangle:34 family=2 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:25.719000 audit[1751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff9520470 a2=0 a3=1 items=0 ppid=1723 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:25.719000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:21:25.719000 audit[1754]: NETFILTER_CFG table=filter:35 family=10 entries=2 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:25.719000 audit[1754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffd3f2b80 a2=0 a3=1 items=0 ppid=1723 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:25.719000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:21:25.720000 audit[1755]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:25.720000 audit[1755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd7dce730 a2=0 a3=1 items=0 ppid=1723 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:25.720000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:21:25.721000 audit[1756]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:25.721000 audit[1756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcc4bdf20 a2=0 a3=1 items=0 ppid=1723 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:25.721000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:21:25.784419 kubelet[1723]: I0515 10:21:25.784380 1723 policy_none.go:49] "None policy: Start" May 15 10:21:25.785209 kubelet[1723]: I0515 10:21:25.785183 1723 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 10:21:25.785269 kubelet[1723]: I0515 10:21:25.785226 1723 state_mem.go:35] "Initializing new in-memory state store" May 15 10:21:25.789948 systemd[1]: Created slice kubepods.slice. May 15 10:21:25.794219 systemd[1]: Created slice kubepods-besteffort.slice. May 15 10:21:25.798067 kubelet[1723]: I0515 10:21:25.798027 1723 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:21:25.798435 kubelet[1723]: E0515 10:21:25.798399 1723 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.103:6443/api/v1/nodes\": dial tcp 10.0.0.103:6443: connect: connection refused" node="localhost" May 15 10:21:25.807181 systemd[1]: Created slice kubepods-burstable.slice. May 15 10:21:25.808331 kubelet[1723]: I0515 10:21:25.808308 1723 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:21:25.808000 audit[1723]: AVC avc: denied { mac_admin } for pid=1723 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:25.808000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:21:25.808000 audit[1723]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a4d230 a1=4000594510 a2=4000a4d200 a3=25 items=0 ppid=1 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:25.808000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:21:25.808951 kubelet[1723]: I0515 10:21:25.808361 1723 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:21:25.808951 kubelet[1723]: I0515 10:21:25.808654 1723 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:21:25.808951 kubelet[1723]: I0515 10:21:25.808942 1723 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:21:25.809413 kubelet[1723]: E0515 10:21:25.809381 1723 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 15 10:21:25.818056 kubelet[1723]: I0515 10:21:25.818008 1723 topology_manager.go:215] "Topology Admit Handler" podUID="a2512c7e8fb26973fe6ec4071fa5d392" podNamespace="kube-system" podName="kube-apiserver-localhost" May 15 10:21:25.818856 kubelet[1723]: I0515 10:21:25.818820 1723 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 15 10:21:25.819582 kubelet[1723]: I0515 10:21:25.819545 1723 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 15 10:21:25.823860 systemd[1]: Created slice kubepods-burstable-poda2512c7e8fb26973fe6ec4071fa5d392.slice. May 15 10:21:25.853211 systemd[1]: Created slice kubepods-burstable-podb20b39a8540dba87b5883a6f0f602dba.slice. May 15 10:21:25.856350 systemd[1]: Created slice kubepods-burstable-pod6ece95f10dbffa04b25ec3439a115512.slice. May 15 10:21:25.897357 kubelet[1723]: I0515 10:21:25.897268 1723 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a2512c7e8fb26973fe6ec4071fa5d392-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"a2512c7e8fb26973fe6ec4071fa5d392\") " pod="kube-system/kube-apiserver-localhost" May 15 10:21:25.897357 kubelet[1723]: I0515 10:21:25.897302 1723 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a2512c7e8fb26973fe6ec4071fa5d392-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"a2512c7e8fb26973fe6ec4071fa5d392\") " pod="kube-system/kube-apiserver-localhost" May 15 10:21:25.897357 kubelet[1723]: I0515 10:21:25.897323 1723 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a2512c7e8fb26973fe6ec4071fa5d392-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"a2512c7e8fb26973fe6ec4071fa5d392\") " pod="kube-system/kube-apiserver-localhost" May 15 10:21:25.897357 kubelet[1723]: I0515 10:21:25.897342 1723 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:21:25.897357 kubelet[1723]: I0515 10:21:25.897358 1723 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:21:25.897509 kubelet[1723]: I0515 10:21:25.897392 1723 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:21:25.897509 kubelet[1723]: I0515 10:21:25.897409 1723 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:21:25.897509 kubelet[1723]: I0515 10:21:25.897424 1723 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:21:25.897509 kubelet[1723]: I0515 10:21:25.897440 1723 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 15 10:21:25.897509 kubelet[1723]: E0515 10:21:25.897471 1723 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.103:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.103:6443: connect: connection refused" interval="400ms" May 15 10:21:25.999974 kubelet[1723]: I0515 10:21:25.999930 1723 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:21:26.000327 kubelet[1723]: E0515 10:21:26.000293 1723 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.103:6443/api/v1/nodes\": dial tcp 10.0.0.103:6443: connect: connection refused" node="localhost" May 15 10:21:26.151993 kubelet[1723]: E0515 10:21:26.151904 1723 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:26.152663 env[1217]: time="2025-05-15T10:21:26.152606357Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:a2512c7e8fb26973fe6ec4071fa5d392,Namespace:kube-system,Attempt:0,}" May 15 10:21:26.155383 kubelet[1723]: E0515 10:21:26.155354 1723 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:26.155913 env[1217]: time="2025-05-15T10:21:26.155859805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,}" May 15 10:21:26.158383 kubelet[1723]: E0515 10:21:26.158354 1723 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:26.159202 env[1217]: time="2025-05-15T10:21:26.159155307Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,}" May 15 10:21:26.298398 kubelet[1723]: E0515 10:21:26.298354 1723 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.103:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.103:6443: connect: connection refused" interval="800ms" May 15 10:21:26.401568 kubelet[1723]: I0515 10:21:26.401268 1723 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:21:26.401568 kubelet[1723]: E0515 10:21:26.401536 1723 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.103:6443/api/v1/nodes\": dial tcp 10.0.0.103:6443: connect: connection refused" node="localhost" May 15 10:21:26.440060 kubelet[1723]: E0515 10:21:26.439916 1723 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.103:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.103:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183fac2c0e07f1d3 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 10:21:25.656981971 +0000 UTC m=+0.949751872,LastTimestamp:2025-05-15 10:21:25.656981971 +0000 UTC m=+0.949751872,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 10:21:26.536017 kubelet[1723]: W0515 10:21:26.535949 1723 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.103:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.103:6443: connect: connection refused May 15 10:21:26.536017 kubelet[1723]: E0515 10:21:26.536019 1723 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.103:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.103:6443: connect: connection refused May 15 10:21:26.655491 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount588125875.mount: Deactivated successfully. May 15 10:21:26.664593 env[1217]: time="2025-05-15T10:21:26.663645368Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:26.666775 env[1217]: time="2025-05-15T10:21:26.666740555Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:26.669593 env[1217]: time="2025-05-15T10:21:26.669550519Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:26.672249 env[1217]: time="2025-05-15T10:21:26.672211417Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:26.675042 env[1217]: time="2025-05-15T10:21:26.675000635Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:26.678172 env[1217]: time="2025-05-15T10:21:26.677117193Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:26.679265 env[1217]: time="2025-05-15T10:21:26.679234591Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:26.680720 env[1217]: time="2025-05-15T10:21:26.680591823Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:26.683482 env[1217]: time="2025-05-15T10:21:26.682777178Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:26.686132 env[1217]: time="2025-05-15T10:21:26.685209859Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:26.689794 env[1217]: time="2025-05-15T10:21:26.689744946Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:26.704924 env[1217]: time="2025-05-15T10:21:26.704815453Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:26.731254 env[1217]: time="2025-05-15T10:21:26.731146527Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:21:26.731254 env[1217]: time="2025-05-15T10:21:26.731206410Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:21:26.732906 env[1217]: time="2025-05-15T10:21:26.731217283Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:21:26.732906 env[1217]: time="2025-05-15T10:21:26.731518095Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2b8acfcfc23b31f9ab8a5c73c645e7710336cc04bbb352cceb748233007a87b1 pid=1769 runtime=io.containerd.runc.v2 May 15 10:21:26.734533 env[1217]: time="2025-05-15T10:21:26.734451223Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:21:26.734765 env[1217]: time="2025-05-15T10:21:26.734705784Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:21:26.734765 env[1217]: time="2025-05-15T10:21:26.734741242Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:21:26.734765 env[1217]: time="2025-05-15T10:21:26.734751835Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:21:26.734933 env[1217]: time="2025-05-15T10:21:26.734771543Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:21:26.734933 env[1217]: time="2025-05-15T10:21:26.734794289Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:21:26.734993 env[1217]: time="2025-05-15T10:21:26.734951431Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5825c05123534df441cacc0fa62b8ca252699ea08ab5b19eadf7e9106b5d328d pid=1788 runtime=io.containerd.runc.v2 May 15 10:21:26.735174 env[1217]: time="2025-05-15T10:21:26.735115168Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7234917300f854eb13916de3b9861a7e94e99da96737d978649d3472b094cd0a pid=1789 runtime=io.containerd.runc.v2 May 15 10:21:26.744558 systemd[1]: Started cri-containerd-2b8acfcfc23b31f9ab8a5c73c645e7710336cc04bbb352cceb748233007a87b1.scope. May 15 10:21:26.750860 systemd[1]: Started cri-containerd-5825c05123534df441cacc0fa62b8ca252699ea08ab5b19eadf7e9106b5d328d.scope. May 15 10:21:26.764667 systemd[1]: Started cri-containerd-7234917300f854eb13916de3b9861a7e94e99da96737d978649d3472b094cd0a.scope. May 15 10:21:26.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.775000 audit: BPF prog-id=58 op=LOAD May 15 10:21:26.778000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1769 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262386163666366633233623331663961623861356337336336343565 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1769 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262386163666366633233623331663961623861356337336336343565 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit: BPF prog-id=59 op=LOAD May 15 10:21:26.778000 audit[1793]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1769 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262386163666366633233623331663961623861356337336336343565 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit: BPF prog-id=60 op=LOAD May 15 10:21:26.778000 audit[1793]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1769 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262386163666366633233623331663961623861356337336336343565 May 15 10:21:26.778000 audit: BPF prog-id=60 op=UNLOAD May 15 10:21:26.778000 audit: BPF prog-id=59 op=UNLOAD May 15 10:21:26.778000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.778000 audit: BPF prog-id=61 op=LOAD May 15 10:21:26.778000 audit[1793]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1769 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262386163666366633233623331663961623861356337336336343565 May 15 10:21:26.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit: BPF prog-id=62 op=LOAD May 15 10:21:26.782000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1788 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323563303531323335333464663434316361636330666136326238 May 15 10:21:26.782000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1788 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323563303531323335333464663434316361636330666136326238 May 15 10:21:26.782000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.782000 audit: BPF prog-id=63 op=LOAD May 15 10:21:26.782000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1788 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323563303531323335333464663434316361636330666136326238 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit: BPF prog-id=64 op=LOAD May 15 10:21:26.783000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1788 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323563303531323335333464663434316361636330666136326238 May 15 10:21:26.783000 audit: BPF prog-id=64 op=UNLOAD May 15 10:21:26.783000 audit: BPF prog-id=63 op=UNLOAD May 15 10:21:26.783000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.783000 audit: BPF prog-id=65 op=LOAD May 15 10:21:26.783000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1788 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323563303531323335333464663434316361636330666136326238 May 15 10:21:26.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.791000 audit: BPF prog-id=66 op=LOAD May 15 10:21:26.792000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1789 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732333439313733303066383534656231333931366465336239383631 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1789 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732333439313733303066383534656231333931366465336239383631 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit: BPF prog-id=67 op=LOAD May 15 10:21:26.792000 audit[1815]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1789 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732333439313733303066383534656231333931366465336239383631 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit: BPF prog-id=68 op=LOAD May 15 10:21:26.792000 audit[1815]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1789 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732333439313733303066383534656231333931366465336239383631 May 15 10:21:26.792000 audit: BPF prog-id=68 op=UNLOAD May 15 10:21:26.792000 audit: BPF prog-id=67 op=UNLOAD May 15 10:21:26.792000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.792000 audit: BPF prog-id=69 op=LOAD May 15 10:21:26.792000 audit[1815]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1789 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732333439313733303066383534656231333931366465336239383631 May 15 10:21:26.806584 env[1217]: time="2025-05-15T10:21:26.806532562Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:a2512c7e8fb26973fe6ec4071fa5d392,Namespace:kube-system,Attempt:0,} returns sandbox id \"2b8acfcfc23b31f9ab8a5c73c645e7710336cc04bbb352cceb748233007a87b1\"" May 15 10:21:26.814544 kubelet[1723]: E0515 10:21:26.814506 1723 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:26.815739 env[1217]: time="2025-05-15T10:21:26.815691841Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,} returns sandbox id \"5825c05123534df441cacc0fa62b8ca252699ea08ab5b19eadf7e9106b5d328d\"" May 15 10:21:26.817035 kubelet[1723]: E0515 10:21:26.816297 1723 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:26.817552 env[1217]: time="2025-05-15T10:21:26.817500432Z" level=info msg="CreateContainer within sandbox \"2b8acfcfc23b31f9ab8a5c73c645e7710336cc04bbb352cceb748233007a87b1\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 15 10:21:26.817998 env[1217]: time="2025-05-15T10:21:26.817969259Z" level=info msg="CreateContainer within sandbox \"5825c05123534df441cacc0fa62b8ca252699ea08ab5b19eadf7e9106b5d328d\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 15 10:21:26.822859 env[1217]: time="2025-05-15T10:21:26.822814392Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,} returns sandbox id \"7234917300f854eb13916de3b9861a7e94e99da96737d978649d3472b094cd0a\"" May 15 10:21:26.823576 kubelet[1723]: E0515 10:21:26.823533 1723 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:26.827175 env[1217]: time="2025-05-15T10:21:26.827113507Z" level=info msg="CreateContainer within sandbox \"7234917300f854eb13916de3b9861a7e94e99da96737d978649d3472b094cd0a\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 15 10:21:26.835144 env[1217]: time="2025-05-15T10:21:26.835101798Z" level=info msg="CreateContainer within sandbox \"2b8acfcfc23b31f9ab8a5c73c645e7710336cc04bbb352cceb748233007a87b1\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"7b19ba1d6a55152cf1e26f94b5b07993753c5f02bc4f214c0b84821dee06094f\"" May 15 10:21:26.835837 env[1217]: time="2025-05-15T10:21:26.835809556Z" level=info msg="StartContainer for \"7b19ba1d6a55152cf1e26f94b5b07993753c5f02bc4f214c0b84821dee06094f\"" May 15 10:21:26.838444 env[1217]: time="2025-05-15T10:21:26.838400338Z" level=info msg="CreateContainer within sandbox \"5825c05123534df441cacc0fa62b8ca252699ea08ab5b19eadf7e9106b5d328d\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"accfc12c6a7f161fdaae743482a26c60377145f3a135d158c29163a07c4313ce\"" May 15 10:21:26.838879 env[1217]: time="2025-05-15T10:21:26.838848658Z" level=info msg="StartContainer for \"accfc12c6a7f161fdaae743482a26c60377145f3a135d158c29163a07c4313ce\"" May 15 10:21:26.845599 env[1217]: time="2025-05-15T10:21:26.845556468Z" level=info msg="CreateContainer within sandbox \"7234917300f854eb13916de3b9861a7e94e99da96737d978649d3472b094cd0a\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"4a23c14c7922033870d99f1918682501ad101961b5b17fe6cb46620ce0ba50da\"" May 15 10:21:26.846155 env[1217]: time="2025-05-15T10:21:26.846129110Z" level=info msg="StartContainer for \"4a23c14c7922033870d99f1918682501ad101961b5b17fe6cb46620ce0ba50da\"" May 15 10:21:26.852719 systemd[1]: Started cri-containerd-7b19ba1d6a55152cf1e26f94b5b07993753c5f02bc4f214c0b84821dee06094f.scope. May 15 10:21:26.864479 systemd[1]: Started cri-containerd-4a23c14c7922033870d99f1918682501ad101961b5b17fe6cb46620ce0ba50da.scope. May 15 10:21:26.865276 systemd[1]: Started cri-containerd-accfc12c6a7f161fdaae743482a26c60377145f3a135d158c29163a07c4313ce.scope. May 15 10:21:26.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.906000 audit: BPF prog-id=70 op=LOAD May 15 10:21:26.907000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=1769 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762313962613164366135353135326366316532366639346235623037 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1769 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762313962613164366135353135326366316532366639346235623037 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit: BPF prog-id=71 op=LOAD May 15 10:21:26.907000 audit[1894]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1769 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762313962613164366135353135326366316532366639346235623037 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit: BPF prog-id=72 op=LOAD May 15 10:21:26.907000 audit[1894]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1769 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762313962613164366135353135326366316532366639346235623037 May 15 10:21:26.907000 audit: BPF prog-id=72 op=UNLOAD May 15 10:21:26.907000 audit: BPF prog-id=71 op=UNLOAD May 15 10:21:26.907000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.907000 audit: BPF prog-id=73 op=LOAD May 15 10:21:26.907000 audit[1894]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1769 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762313962613164366135353135326366316532366639346235623037 May 15 10:21:26.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit: BPF prog-id=74 op=LOAD May 15 10:21:26.911000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=1789 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461323363313463373932323033333837306439396631393138363832 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1789 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461323363313463373932323033333837306439396631393138363832 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit: BPF prog-id=75 op=LOAD May 15 10:21:26.911000 audit[1923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1789 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461323363313463373932323033333837306439396631393138363832 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit: BPF prog-id=76 op=LOAD May 15 10:21:26.911000 audit[1923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1789 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461323363313463373932323033333837306439396631393138363832 May 15 10:21:26.911000 audit: BPF prog-id=76 op=UNLOAD May 15 10:21:26.911000 audit: BPF prog-id=75 op=UNLOAD May 15 10:21:26.911000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { perfmon } for pid=1923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit[1923]: AVC avc: denied { bpf } for pid=1923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.911000 audit: BPF prog-id=77 op=LOAD May 15 10:21:26.911000 audit[1923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1789 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461323363313463373932323033333837306439396631393138363832 May 15 10:21:26.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit: BPF prog-id=78 op=LOAD May 15 10:21:26.915000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1788 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163636663313263366137663136316664616165373433343832613236 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1788 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163636663313263366137663136316664616165373433343832613236 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit: BPF prog-id=79 op=LOAD May 15 10:21:26.915000 audit[1905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1788 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163636663313263366137663136316664616165373433343832613236 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit: BPF prog-id=80 op=LOAD May 15 10:21:26.915000 audit[1905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1788 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163636663313263366137663136316664616165373433343832613236 May 15 10:21:26.915000 audit: BPF prog-id=80 op=UNLOAD May 15 10:21:26.915000 audit: BPF prog-id=79 op=UNLOAD May 15 10:21:26.915000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:26.915000 audit: BPF prog-id=81 op=LOAD May 15 10:21:26.915000 audit[1905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1788 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:26.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163636663313263366137663136316664616165373433343832613236 May 15 10:21:26.970642 env[1217]: time="2025-05-15T10:21:26.966098859Z" level=info msg="StartContainer for \"7b19ba1d6a55152cf1e26f94b5b07993753c5f02bc4f214c0b84821dee06094f\" returns successfully" May 15 10:21:26.976909 env[1217]: time="2025-05-15T10:21:26.974033942Z" level=info msg="StartContainer for \"accfc12c6a7f161fdaae743482a26c60377145f3a135d158c29163a07c4313ce\" returns successfully" May 15 10:21:26.976909 env[1217]: time="2025-05-15T10:21:26.974232019Z" level=info msg="StartContainer for \"4a23c14c7922033870d99f1918682501ad101961b5b17fe6cb46620ce0ba50da\" returns successfully" May 15 10:21:27.077088 kubelet[1723]: W0515 10:21:27.077019 1723 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.103:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.103:6443: connect: connection refused May 15 10:21:27.077088 kubelet[1723]: E0515 10:21:27.077089 1723 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.103:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.103:6443: connect: connection refused May 15 10:21:27.098735 kubelet[1723]: E0515 10:21:27.098685 1723 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.103:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.103:6443: connect: connection refused" interval="1.6s" May 15 10:21:27.113408 kubelet[1723]: W0515 10:21:27.113364 1723 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.103:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.103:6443: connect: connection refused May 15 10:21:27.113645 kubelet[1723]: E0515 10:21:27.113625 1723 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.103:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.103:6443: connect: connection refused May 15 10:21:27.203144 kubelet[1723]: I0515 10:21:27.203107 1723 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:21:27.728078 kubelet[1723]: E0515 10:21:27.728048 1723 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:27.730793 kubelet[1723]: E0515 10:21:27.730765 1723 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:27.732594 kubelet[1723]: E0515 10:21:27.732567 1723 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:28.293000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:28.297952 kernel: kauditd_printk_skb: 561 callbacks suppressed May 15 10:21:28.298031 kernel: audit: type=1400 audit(1747304488.293:560): avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:28.298050 kernel: audit: type=1300 audit(1747304488.293:560): arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=400013a630 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:21:28.293000 audit[1946]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=400013a630 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:21:28.293000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:21:28.304946 kernel: audit: type=1327 audit(1747304488.293:560): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:21:28.305014 kernel: audit: type=1400 audit(1747304488.293:561): avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:28.293000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:28.293000 audit[1946]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000438720 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:21:28.311509 kernel: audit: type=1300 audit(1747304488.293:561): arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000438720 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:21:28.311543 kernel: audit: type=1327 audit(1747304488.293:561): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:21:28.293000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:21:28.336086 kernel: audit: type=1400 audit(1747304488.327:562): avc: denied { watch } for pid=1937 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:28.336182 kernel: audit: type=1300 audit(1747304488.327:562): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4003630ff0 a2=fc6 a3=0 items=0 ppid=1769 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 key=(null) May 15 10:21:28.327000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:28.327000 audit[1937]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4003630ff0 a2=fc6 a3=0 items=0 ppid=1769 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 key=(null) May 15 10:21:28.327000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:21:28.339643 kernel: audit: type=1327 audit(1747304488.327:562): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:21:28.328000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:28.346170 kernel: audit: type=1400 audit(1747304488.328:564): avc: denied { watch } for pid=1937 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:28.328000 audit[1937]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40036310b0 a2=fc6 a3=0 items=0 ppid=1769 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 key=(null) May 15 10:21:28.328000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:21:28.329000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:28.329000 audit[1937]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=48 a1=4003631470 a2=fc6 a3=0 items=0 ppid=1769 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 key=(null) May 15 10:21:28.329000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:21:28.327000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:28.327000 audit[1937]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4006aeae80 a2=fc6 a3=0 items=0 ppid=1769 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 key=(null) May 15 10:21:28.327000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:21:28.354000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:28.354000 audit[1937]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=89 a1=4004911020 a2=fc6 a3=0 items=0 ppid=1769 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 key=(null) May 15 10:21:28.354000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:21:28.354000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:28.354000 audit[1937]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=89 a1=4004a9f020 a2=fc6 a3=0 items=0 ppid=1769 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 key=(null) May 15 10:21:28.354000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:21:28.462337 kubelet[1723]: I0515 10:21:28.462289 1723 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 15 10:21:28.657486 kubelet[1723]: I0515 10:21:28.657453 1723 apiserver.go:52] "Watching apiserver" May 15 10:21:28.696867 kubelet[1723]: I0515 10:21:28.696842 1723 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 10:21:28.739443 kubelet[1723]: E0515 10:21:28.739407 1723 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 15 10:21:28.739991 kubelet[1723]: E0515 10:21:28.739960 1723 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:30.334234 kubelet[1723]: E0515 10:21:30.334187 1723 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:30.677124 systemd[1]: Reloading. May 15 10:21:30.736015 kubelet[1723]: E0515 10:21:30.735985 1723 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:30.737639 /usr/lib/systemd/system-generators/torcx-generator[2019]: time="2025-05-15T10:21:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:21:30.738056 /usr/lib/systemd/system-generators/torcx-generator[2019]: time="2025-05-15T10:21:30Z" level=info msg="torcx already run" May 15 10:21:30.804506 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:21:30.804528 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:21:30.822152 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:21:30.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit: BPF prog-id=82 op=LOAD May 15 10:21:30.888000 audit: BPF prog-id=43 op=UNLOAD May 15 10:21:30.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit: BPF prog-id=83 op=LOAD May 15 10:21:30.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.888000 audit: BPF prog-id=84 op=LOAD May 15 10:21:30.888000 audit: BPF prog-id=44 op=UNLOAD May 15 10:21:30.888000 audit: BPF prog-id=45 op=UNLOAD May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit: BPF prog-id=85 op=LOAD May 15 10:21:30.889000 audit: BPF prog-id=46 op=UNLOAD May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit: BPF prog-id=86 op=LOAD May 15 10:21:30.889000 audit: BPF prog-id=47 op=UNLOAD May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit: BPF prog-id=87 op=LOAD May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.889000 audit: BPF prog-id=88 op=LOAD May 15 10:21:30.889000 audit: BPF prog-id=48 op=UNLOAD May 15 10:21:30.889000 audit: BPF prog-id=49 op=UNLOAD May 15 10:21:30.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.890000 audit: BPF prog-id=89 op=LOAD May 15 10:21:30.890000 audit: BPF prog-id=62 op=UNLOAD May 15 10:21:30.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.891000 audit: BPF prog-id=90 op=LOAD May 15 10:21:30.891000 audit: BPF prog-id=78 op=UNLOAD May 15 10:21:30.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.892000 audit: BPF prog-id=91 op=LOAD May 15 10:21:30.892000 audit: BPF prog-id=50 op=UNLOAD May 15 10:21:30.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit: BPF prog-id=92 op=LOAD May 15 10:21:30.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.893000 audit: BPF prog-id=93 op=LOAD May 15 10:21:30.893000 audit: BPF prog-id=51 op=UNLOAD May 15 10:21:30.893000 audit: BPF prog-id=52 op=UNLOAD May 15 10:21:30.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit: BPF prog-id=94 op=LOAD May 15 10:21:30.894000 audit: BPF prog-id=53 op=UNLOAD May 15 10:21:30.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit: BPF prog-id=95 op=LOAD May 15 10:21:30.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.894000 audit: BPF prog-id=96 op=LOAD May 15 10:21:30.894000 audit: BPF prog-id=54 op=UNLOAD May 15 10:21:30.894000 audit: BPF prog-id=55 op=UNLOAD May 15 10:21:30.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.895000 audit: BPF prog-id=97 op=LOAD May 15 10:21:30.895000 audit: BPF prog-id=58 op=UNLOAD May 15 10:21:30.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.896000 audit: BPF prog-id=98 op=LOAD May 15 10:21:30.896000 audit: BPF prog-id=56 op=UNLOAD May 15 10:21:30.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.897000 audit: BPF prog-id=99 op=LOAD May 15 10:21:30.897000 audit: BPF prog-id=66 op=UNLOAD May 15 10:21:30.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit: BPF prog-id=100 op=LOAD May 15 10:21:30.898000 audit: BPF prog-id=70 op=UNLOAD May 15 10:21:30.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit: BPF prog-id=101 op=LOAD May 15 10:21:30.898000 audit: BPF prog-id=74 op=UNLOAD May 15 10:21:30.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:30.899000 audit: BPF prog-id=102 op=LOAD May 15 10:21:30.899000 audit: BPF prog-id=57 op=UNLOAD May 15 10:21:30.920464 kubelet[1723]: I0515 10:21:30.920396 1723 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:21:30.920747 systemd[1]: Stopping kubelet.service... May 15 10:21:30.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:30.943462 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:21:30.943856 systemd[1]: Stopped kubelet.service. May 15 10:21:30.943941 systemd[1]: kubelet.service: Consumed 1.316s CPU time. May 15 10:21:30.945710 systemd[1]: Starting kubelet.service... May 15 10:21:31.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:31.029551 systemd[1]: Started kubelet.service. May 15 10:21:31.075620 kubelet[2061]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:21:31.075920 kubelet[2061]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 10:21:31.075965 kubelet[2061]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:21:31.076081 kubelet[2061]: I0515 10:21:31.076054 2061 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:21:31.083595 kubelet[2061]: I0515 10:21:31.082921 2061 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 15 10:21:31.083595 kubelet[2061]: I0515 10:21:31.082946 2061 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:21:31.083595 kubelet[2061]: I0515 10:21:31.083153 2061 server.go:927] "Client rotation is on, will bootstrap in background" May 15 10:21:31.087303 kubelet[2061]: I0515 10:21:31.087283 2061 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 15 10:21:31.089137 kubelet[2061]: I0515 10:21:31.089109 2061 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:21:31.094374 kubelet[2061]: I0515 10:21:31.094353 2061 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:21:31.094651 kubelet[2061]: I0515 10:21:31.094625 2061 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:21:31.094870 kubelet[2061]: I0515 10:21:31.094710 2061 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 15 10:21:31.094994 kubelet[2061]: I0515 10:21:31.094981 2061 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:21:31.095053 kubelet[2061]: I0515 10:21:31.095043 2061 container_manager_linux.go:301] "Creating device plugin manager" May 15 10:21:31.095149 kubelet[2061]: I0515 10:21:31.095138 2061 state_mem.go:36] "Initialized new in-memory state store" May 15 10:21:31.095350 kubelet[2061]: I0515 10:21:31.095335 2061 kubelet.go:400] "Attempting to sync node with API server" May 15 10:21:31.095420 kubelet[2061]: I0515 10:21:31.095410 2061 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:21:31.095503 kubelet[2061]: I0515 10:21:31.095492 2061 kubelet.go:312] "Adding apiserver pod source" May 15 10:21:31.095564 kubelet[2061]: I0515 10:21:31.095554 2061 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:21:31.096223 kubelet[2061]: I0515 10:21:31.096191 2061 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:21:31.096637 kubelet[2061]: I0515 10:21:31.096612 2061 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:21:31.097505 kubelet[2061]: I0515 10:21:31.097469 2061 server.go:1264] "Started kubelet" May 15 10:21:31.097000 audit[2061]: AVC avc: denied { mac_admin } for pid=2061 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:31.097000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:21:31.097000 audit[2061]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b9dcb0 a1=4000a035d8 a2=4000b9dc80 a3=25 items=0 ppid=1 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:31.097000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:21:31.097000 audit[2061]: AVC avc: denied { mac_admin } for pid=2061 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:31.097000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:21:31.097000 audit[2061]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008a1700 a1=4000a035f0 a2=4000b9dd40 a3=25 items=0 ppid=1 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:31.097000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:21:31.099370 kubelet[2061]: I0515 10:21:31.098973 2061 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:21:31.099370 kubelet[2061]: I0515 10:21:31.099006 2061 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 10:21:31.099370 kubelet[2061]: I0515 10:21:31.099038 2061 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:21:31.100987 kubelet[2061]: E0515 10:21:31.100947 2061 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:21:31.101107 kubelet[2061]: I0515 10:21:31.101077 2061 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:21:31.101592 kubelet[2061]: I0515 10:21:31.101542 2061 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:21:31.101805 kubelet[2061]: I0515 10:21:31.101780 2061 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:21:31.106267 kubelet[2061]: I0515 10:21:31.102034 2061 volume_manager.go:291] "Starting Kubelet Volume Manager" May 15 10:21:31.106267 kubelet[2061]: I0515 10:21:31.102609 2061 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 10:21:31.106267 kubelet[2061]: I0515 10:21:31.102764 2061 reconciler.go:26] "Reconciler: start to sync state" May 15 10:21:31.106267 kubelet[2061]: I0515 10:21:31.103590 2061 server.go:455] "Adding debug handlers to kubelet server" May 15 10:21:31.111706 kubelet[2061]: I0515 10:21:31.111675 2061 factory.go:221] Registration of the systemd container factory successfully May 15 10:21:31.111800 kubelet[2061]: I0515 10:21:31.111777 2061 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:21:31.123588 kubelet[2061]: I0515 10:21:31.123557 2061 factory.go:221] Registration of the containerd container factory successfully May 15 10:21:31.131238 kubelet[2061]: I0515 10:21:31.131197 2061 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:21:31.132233 kubelet[2061]: I0515 10:21:31.132095 2061 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:21:31.132233 kubelet[2061]: I0515 10:21:31.132144 2061 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 10:21:31.132233 kubelet[2061]: I0515 10:21:31.132176 2061 kubelet.go:2337] "Starting kubelet main sync loop" May 15 10:21:31.132233 kubelet[2061]: E0515 10:21:31.132215 2061 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:21:31.183996 kubelet[2061]: I0515 10:21:31.183971 2061 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 10:21:31.184198 kubelet[2061]: I0515 10:21:31.184183 2061 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 10:21:31.184281 kubelet[2061]: I0515 10:21:31.184271 2061 state_mem.go:36] "Initialized new in-memory state store" May 15 10:21:31.184638 kubelet[2061]: I0515 10:21:31.184621 2061 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 15 10:21:31.184773 kubelet[2061]: I0515 10:21:31.184735 2061 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 15 10:21:31.184843 kubelet[2061]: I0515 10:21:31.184834 2061 policy_none.go:49] "None policy: Start" May 15 10:21:31.186812 kubelet[2061]: I0515 10:21:31.186788 2061 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 10:21:31.186812 kubelet[2061]: I0515 10:21:31.186816 2061 state_mem.go:35] "Initializing new in-memory state store" May 15 10:21:31.186972 kubelet[2061]: I0515 10:21:31.186957 2061 state_mem.go:75] "Updated machine memory state" May 15 10:21:31.192208 kubelet[2061]: I0515 10:21:31.192187 2061 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:21:31.191000 audit[2061]: AVC avc: denied { mac_admin } for pid=2061 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:31.191000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:21:31.191000 audit[2061]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001368060 a1=4001360b70 a2=4001368030 a3=25 items=0 ppid=1 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:31.191000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:21:31.192463 kubelet[2061]: I0515 10:21:31.192248 2061 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:21:31.192697 kubelet[2061]: I0515 10:21:31.192660 2061 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:21:31.192995 kubelet[2061]: I0515 10:21:31.192773 2061 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:21:31.208230 kubelet[2061]: I0515 10:21:31.208121 2061 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:21:31.216106 kubelet[2061]: I0515 10:21:31.216080 2061 kubelet_node_status.go:112] "Node was previously registered" node="localhost" May 15 10:21:31.216300 kubelet[2061]: I0515 10:21:31.216288 2061 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 15 10:21:31.232798 kubelet[2061]: I0515 10:21:31.232764 2061 topology_manager.go:215] "Topology Admit Handler" podUID="a2512c7e8fb26973fe6ec4071fa5d392" podNamespace="kube-system" podName="kube-apiserver-localhost" May 15 10:21:31.233030 kubelet[2061]: I0515 10:21:31.233010 2061 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 15 10:21:31.233468 kubelet[2061]: I0515 10:21:31.233147 2061 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 15 10:21:31.240229 kubelet[2061]: E0515 10:21:31.240201 2061 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 15 10:21:31.403977 kubelet[2061]: I0515 10:21:31.403940 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a2512c7e8fb26973fe6ec4071fa5d392-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"a2512c7e8fb26973fe6ec4071fa5d392\") " pod="kube-system/kube-apiserver-localhost" May 15 10:21:31.404156 kubelet[2061]: I0515 10:21:31.404137 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:21:31.404277 kubelet[2061]: I0515 10:21:31.404263 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:21:31.404367 kubelet[2061]: I0515 10:21:31.404354 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 15 10:21:31.404489 kubelet[2061]: I0515 10:21:31.404475 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a2512c7e8fb26973fe6ec4071fa5d392-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"a2512c7e8fb26973fe6ec4071fa5d392\") " pod="kube-system/kube-apiserver-localhost" May 15 10:21:31.404595 kubelet[2061]: I0515 10:21:31.404582 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a2512c7e8fb26973fe6ec4071fa5d392-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"a2512c7e8fb26973fe6ec4071fa5d392\") " pod="kube-system/kube-apiserver-localhost" May 15 10:21:31.404684 kubelet[2061]: I0515 10:21:31.404669 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:21:31.404777 kubelet[2061]: I0515 10:21:31.404765 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:21:31.404873 kubelet[2061]: I0515 10:21:31.404859 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:21:31.541813 kubelet[2061]: E0515 10:21:31.541718 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:31.541919 kubelet[2061]: E0515 10:21:31.541840 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:31.542185 kubelet[2061]: E0515 10:21:31.542151 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:32.096050 kubelet[2061]: I0515 10:21:32.096014 2061 apiserver.go:52] "Watching apiserver" May 15 10:21:32.103172 kubelet[2061]: I0515 10:21:32.103123 2061 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 10:21:32.148870 kubelet[2061]: E0515 10:21:32.148834 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:32.158611 kubelet[2061]: E0515 10:21:32.158578 2061 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 15 10:21:32.158973 kubelet[2061]: E0515 10:21:32.158955 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:32.159311 kubelet[2061]: E0515 10:21:32.159290 2061 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 15 10:21:32.159693 kubelet[2061]: E0515 10:21:32.159662 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:32.180201 kubelet[2061]: I0515 10:21:32.180093 2061 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.180076372 podStartE2EDuration="1.180076372s" podCreationTimestamp="2025-05-15 10:21:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:21:32.171573834 +0000 UTC m=+1.136960702" watchObservedRunningTime="2025-05-15 10:21:32.180076372 +0000 UTC m=+1.145463240" May 15 10:21:32.186987 kubelet[2061]: I0515 10:21:32.186933 2061 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.186916615 podStartE2EDuration="2.186916615s" podCreationTimestamp="2025-05-15 10:21:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:21:32.180268198 +0000 UTC m=+1.145655066" watchObservedRunningTime="2025-05-15 10:21:32.186916615 +0000 UTC m=+1.152303523" May 15 10:21:33.150356 kubelet[2061]: E0515 10:21:33.150318 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:33.150720 kubelet[2061]: E0515 10:21:33.150702 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:33.407185 kubelet[2061]: E0515 10:21:33.407077 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:33.682000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 10:21:33.684502 kernel: kauditd_printk_skb: 272 callbacks suppressed May 15 10:21:33.684556 kernel: audit: type=1400 audit(1747304493.682:817): avc: denied { watch } for pid=1946 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 10:21:33.682000 audit[1946]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000b0b580 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:21:33.691607 kernel: audit: type=1300 audit(1747304493.682:817): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000b0b580 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:21:33.682000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:21:33.694872 kernel: audit: type=1327 audit(1747304493.682:817): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:21:34.152094 kubelet[2061]: E0515 10:21:34.152055 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:34.152094 kubelet[2061]: E0515 10:21:34.152098 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:35.888346 sudo[1356]: pam_unix(sudo:session): session closed for user root May 15 10:21:35.887000 audit[1356]: USER_END pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:35.890335 sshd[1352]: pam_unix(sshd:session): session closed for user core May 15 10:21:35.887000 audit[1356]: CRED_DISP pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:35.893064 systemd-logind[1203]: Session 7 logged out. Waiting for processes to exit. May 15 10:21:35.893284 systemd[1]: sshd@6-10.0.0.103:22-10.0.0.1:46528.service: Deactivated successfully. May 15 10:21:35.894006 systemd[1]: session-7.scope: Deactivated successfully. May 15 10:21:35.894170 systemd[1]: session-7.scope: Consumed 7.931s CPU time. May 15 10:21:35.894876 kernel: audit: type=1106 audit(1747304495.887:818): pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:35.894946 kernel: audit: type=1104 audit(1747304495.887:819): pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:35.894970 kernel: audit: type=1106 audit(1747304495.887:820): pid=1352 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:35.887000 audit[1352]: USER_END pid=1352 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:35.895173 systemd-logind[1203]: Removed session 7. May 15 10:21:35.887000 audit[1352]: CRED_DISP pid=1352 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:35.901279 kernel: audit: type=1104 audit(1747304495.887:821): pid=1352 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:35.901338 kernel: audit: type=1131 audit(1747304495.891:822): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.103:22-10.0.0.1:46528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:35.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.103:22-10.0.0.1:46528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:41.901123 kubelet[2061]: E0515 10:21:41.901078 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:41.918324 kubelet[2061]: I0515 10:21:41.918260 2061 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=10.918246274 podStartE2EDuration="10.918246274s" podCreationTimestamp="2025-05-15 10:21:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:21:32.187091686 +0000 UTC m=+1.152478554" watchObservedRunningTime="2025-05-15 10:21:41.918246274 +0000 UTC m=+10.883633102" May 15 10:21:42.165533 kubelet[2061]: E0515 10:21:42.165418 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:42.843641 kubelet[2061]: E0515 10:21:42.843546 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:43.415634 kubelet[2061]: E0515 10:21:43.415598 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:44.356000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:44.356000 audit[1946]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001a05f20 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:21:44.365806 kernel: audit: type=1400 audit(1747304504.356:823): avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:44.365891 kernel: audit: type=1300 audit(1747304504.356:823): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001a05f20 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:21:44.365916 kernel: audit: type=1327 audit(1747304504.356:823): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:21:44.356000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:21:44.357000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:44.372355 kernel: audit: type=1400 audit(1747304504.357:824): avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:44.357000 audit[1946]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001a05f60 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:21:44.376465 kernel: audit: type=1300 audit(1747304504.357:824): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001a05f60 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:21:44.357000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:21:44.379900 kernel: audit: type=1327 audit(1747304504.357:824): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:21:44.357000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:44.383018 kernel: audit: type=1400 audit(1747304504.357:825): avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:44.357000 audit[1946]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001a05fa0 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:21:44.387784 kernel: audit: type=1300 audit(1747304504.357:825): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001a05fa0 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:21:44.387871 kernel: audit: type=1327 audit(1747304504.357:825): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:21:44.357000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:21:44.358000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:44.394392 kernel: audit: type=1400 audit(1747304504.358:826): avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:21:44.358000 audit[1946]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001a05fe0 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:21:44.358000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:21:44.510721 kubelet[2061]: I0515 10:21:44.510665 2061 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 15 10:21:44.511071 env[1217]: time="2025-05-15T10:21:44.511036260Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 10:21:44.511268 kubelet[2061]: I0515 10:21:44.511233 2061 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 15 10:21:45.001193 kubelet[2061]: I0515 10:21:45.001112 2061 topology_manager.go:215] "Topology Admit Handler" podUID="fff42641-aed1-4bff-a016-684716d11af7" podNamespace="kube-system" podName="kube-proxy-whw8f" May 15 10:21:45.006945 systemd[1]: Created slice kubepods-besteffort-podfff42641_aed1_4bff_a016_684716d11af7.slice. May 15 10:21:45.100308 kubelet[2061]: I0515 10:21:45.100264 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-54jwh\" (UniqueName: \"kubernetes.io/projected/fff42641-aed1-4bff-a016-684716d11af7-kube-api-access-54jwh\") pod \"kube-proxy-whw8f\" (UID: \"fff42641-aed1-4bff-a016-684716d11af7\") " pod="kube-system/kube-proxy-whw8f" May 15 10:21:45.100549 kubelet[2061]: I0515 10:21:45.100530 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/fff42641-aed1-4bff-a016-684716d11af7-kube-proxy\") pod \"kube-proxy-whw8f\" (UID: \"fff42641-aed1-4bff-a016-684716d11af7\") " pod="kube-system/kube-proxy-whw8f" May 15 10:21:45.100684 kubelet[2061]: I0515 10:21:45.100670 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/fff42641-aed1-4bff-a016-684716d11af7-lib-modules\") pod \"kube-proxy-whw8f\" (UID: \"fff42641-aed1-4bff-a016-684716d11af7\") " pod="kube-system/kube-proxy-whw8f" May 15 10:21:45.100817 kubelet[2061]: I0515 10:21:45.100802 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/fff42641-aed1-4bff-a016-684716d11af7-xtables-lock\") pod \"kube-proxy-whw8f\" (UID: \"fff42641-aed1-4bff-a016-684716d11af7\") " pod="kube-system/kube-proxy-whw8f" May 15 10:21:45.208528 kubelet[2061]: E0515 10:21:45.208493 2061 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found May 15 10:21:45.208528 kubelet[2061]: E0515 10:21:45.208526 2061 projected.go:200] Error preparing data for projected volume kube-api-access-54jwh for pod kube-system/kube-proxy-whw8f: configmap "kube-root-ca.crt" not found May 15 10:21:45.208703 kubelet[2061]: E0515 10:21:45.208584 2061 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/fff42641-aed1-4bff-a016-684716d11af7-kube-api-access-54jwh podName:fff42641-aed1-4bff-a016-684716d11af7 nodeName:}" failed. No retries permitted until 2025-05-15 10:21:45.708564757 +0000 UTC m=+14.673951625 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-54jwh" (UniqueName: "kubernetes.io/projected/fff42641-aed1-4bff-a016-684716d11af7-kube-api-access-54jwh") pod "kube-proxy-whw8f" (UID: "fff42641-aed1-4bff-a016-684716d11af7") : configmap "kube-root-ca.crt" not found May 15 10:21:45.571133 kubelet[2061]: I0515 10:21:45.571078 2061 topology_manager.go:215] "Topology Admit Handler" podUID="7d41b3f4-7447-4883-b4dd-6c27fd36d6dd" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-g8nwh" May 15 10:21:45.573923 kubelet[2061]: W0515 10:21:45.573684 2061 reflector.go:547] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object May 15 10:21:45.573923 kubelet[2061]: E0515 10:21:45.573728 2061 reflector.go:150] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object May 15 10:21:45.576123 systemd[1]: Created slice kubepods-besteffort-pod7d41b3f4_7447_4883_b4dd_6c27fd36d6dd.slice. May 15 10:21:45.706330 kubelet[2061]: I0515 10:21:45.706276 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7d41b3f4-7447-4883-b4dd-6c27fd36d6dd-var-lib-calico\") pod \"tigera-operator-797db67f8-g8nwh\" (UID: \"7d41b3f4-7447-4883-b4dd-6c27fd36d6dd\") " pod="tigera-operator/tigera-operator-797db67f8-g8nwh" May 15 10:21:45.706330 kubelet[2061]: I0515 10:21:45.706325 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ftkpx\" (UniqueName: \"kubernetes.io/projected/7d41b3f4-7447-4883-b4dd-6c27fd36d6dd-kube-api-access-ftkpx\") pod \"tigera-operator-797db67f8-g8nwh\" (UID: \"7d41b3f4-7447-4883-b4dd-6c27fd36d6dd\") " pod="tigera-operator/tigera-operator-797db67f8-g8nwh" May 15 10:21:45.879543 env[1217]: time="2025-05-15T10:21:45.879413250Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-g8nwh,Uid:7d41b3f4-7447-4883-b4dd-6c27fd36d6dd,Namespace:tigera-operator,Attempt:0,}" May 15 10:21:45.896736 env[1217]: time="2025-05-15T10:21:45.896610790Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:21:45.896887 env[1217]: time="2025-05-15T10:21:45.896745147Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:21:45.896887 env[1217]: time="2025-05-15T10:21:45.896772266Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:21:45.897027 env[1217]: time="2025-05-15T10:21:45.896997462Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/73a277c8d8cf69d6ffcd0690d8a6d852df32fcdbe8031cef3c007ede884d3258 pid=2158 runtime=io.containerd.runc.v2 May 15 10:21:45.914604 kubelet[2061]: E0515 10:21:45.914569 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:45.914966 systemd[1]: Started cri-containerd-73a277c8d8cf69d6ffcd0690d8a6d852df32fcdbe8031cef3c007ede884d3258.scope. May 15 10:21:45.915961 env[1217]: time="2025-05-15T10:21:45.915921408Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-whw8f,Uid:fff42641-aed1-4bff-a016-684716d11af7,Namespace:kube-system,Attempt:0,}" May 15 10:21:45.931496 env[1217]: time="2025-05-15T10:21:45.931423941Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:21:45.931496 env[1217]: time="2025-05-15T10:21:45.931477340Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:21:45.931664 env[1217]: time="2025-05-15T10:21:45.931497620Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:21:45.931664 env[1217]: time="2025-05-15T10:21:45.931637817Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7bbb5a58221c14d7d18976dea4566927a2e020376b45e7b9e48b9848b87a4fb5 pid=2191 runtime=io.containerd.runc.v2 May 15 10:21:45.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit: BPF prog-id=103 op=LOAD May 15 10:21:45.937000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2158 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:45.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733613237376338643863663639643666666364303639306438613664 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2158 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:45.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733613237376338643863663639643666666364303639306438613664 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit: BPF prog-id=104 op=LOAD May 15 10:21:45.937000 audit[2167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2158 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:45.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733613237376338643863663639643666666364303639306438613664 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit: BPF prog-id=105 op=LOAD May 15 10:21:45.937000 audit[2167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2158 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:45.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733613237376338643863663639643666666364303639306438613664 May 15 10:21:45.937000 audit: BPF prog-id=105 op=UNLOAD May 15 10:21:45.937000 audit: BPF prog-id=104 op=UNLOAD May 15 10:21:45.937000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.937000 audit: BPF prog-id=106 op=LOAD May 15 10:21:45.937000 audit[2167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2158 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:45.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733613237376338643863663639643666666364303639306438613664 May 15 10:21:45.942807 systemd[1]: Started cri-containerd-7bbb5a58221c14d7d18976dea4566927a2e020376b45e7b9e48b9848b87a4fb5.scope. May 15 10:21:45.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.962000 audit: BPF prog-id=107 op=LOAD May 15 10:21:45.962000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.962000 audit[2200]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2191 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:45.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762626235613538323231633134643764313839373664656134353636 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2191 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:45.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762626235613538323231633134643764313839373664656134353636 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit: BPF prog-id=108 op=LOAD May 15 10:21:45.963000 audit[2200]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2191 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:45.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762626235613538323231633134643764313839373664656134353636 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.963000 audit: BPF prog-id=109 op=LOAD May 15 10:21:45.965526 env[1217]: time="2025-05-15T10:21:45.965461628Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-g8nwh,Uid:7d41b3f4-7447-4883-b4dd-6c27fd36d6dd,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"73a277c8d8cf69d6ffcd0690d8a6d852df32fcdbe8031cef3c007ede884d3258\"" May 15 10:21:45.963000 audit[2200]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2191 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:45.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762626235613538323231633134643764313839373664656134353636 May 15 10:21:45.964000 audit: BPF prog-id=109 op=UNLOAD May 15 10:21:45.964000 audit: BPF prog-id=108 op=UNLOAD May 15 10:21:45.964000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.964000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.964000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.964000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.964000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.964000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.964000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.964000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.964000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.964000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:45.964000 audit: BPF prog-id=110 op=LOAD May 15 10:21:45.964000 audit[2200]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2191 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:45.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762626235613538323231633134643764313839373664656134353636 May 15 10:21:45.968832 env[1217]: time="2025-05-15T10:21:45.968800722Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 15 10:21:45.978622 env[1217]: time="2025-05-15T10:21:45.978583328Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-whw8f,Uid:fff42641-aed1-4bff-a016-684716d11af7,Namespace:kube-system,Attempt:0,} returns sandbox id \"7bbb5a58221c14d7d18976dea4566927a2e020376b45e7b9e48b9848b87a4fb5\"" May 15 10:21:45.979307 kubelet[2061]: E0515 10:21:45.979279 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:45.982526 env[1217]: time="2025-05-15T10:21:45.982483291Z" level=info msg="CreateContainer within sandbox \"7bbb5a58221c14d7d18976dea4566927a2e020376b45e7b9e48b9848b87a4fb5\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 10:21:45.993931 env[1217]: time="2025-05-15T10:21:45.993887146Z" level=info msg="CreateContainer within sandbox \"7bbb5a58221c14d7d18976dea4566927a2e020376b45e7b9e48b9848b87a4fb5\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"f793fd125cffb2b066e5f8cc58b63a203814279900109ee4bb66b5ea7d8d29de\"" May 15 10:21:45.994742 env[1217]: time="2025-05-15T10:21:45.994717249Z" level=info msg="StartContainer for \"f793fd125cffb2b066e5f8cc58b63a203814279900109ee4bb66b5ea7d8d29de\"" May 15 10:21:45.995222 update_engine[1205]: I0515 10:21:45.995196 1205 update_attempter.cc:509] Updating boot flags... May 15 10:21:46.033013 systemd[1]: Started cri-containerd-f793fd125cffb2b066e5f8cc58b63a203814279900109ee4bb66b5ea7d8d29de.scope. May 15 10:21:46.084000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2191 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637393366643132356366666232623036366535663863633538623633 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit: BPF prog-id=111 op=LOAD May 15 10:21:46.084000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2191 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637393366643132356366666232623036366535663863633538623633 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit: BPF prog-id=112 op=LOAD May 15 10:21:46.084000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2191 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637393366643132356366666232623036366535663863633538623633 May 15 10:21:46.084000 audit: BPF prog-id=112 op=UNLOAD May 15 10:21:46.084000 audit: BPF prog-id=111 op=UNLOAD May 15 10:21:46.084000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:46.084000 audit: BPF prog-id=113 op=LOAD May 15 10:21:46.084000 audit[2242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2191 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637393366643132356366666232623036366535663863633538623633 May 15 10:21:46.107871 env[1217]: time="2025-05-15T10:21:46.107816676Z" level=info msg="StartContainer for \"f793fd125cffb2b066e5f8cc58b63a203814279900109ee4bb66b5ea7d8d29de\" returns successfully" May 15 10:21:46.175211 kubelet[2061]: E0515 10:21:46.172333 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:46.260000 audit[2307]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.260000 audit[2307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff20f9700 a2=0 a3=1 items=0 ppid=2262 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.260000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:21:46.260000 audit[2306]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.260000 audit[2306]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd6c84270 a2=0 a3=1 items=0 ppid=2262 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.260000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:21:46.262000 audit[2309]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.262000 audit[2309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff6f81ba0 a2=0 a3=1 items=0 ppid=2262 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.262000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:21:46.263000 audit[2310]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.263000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffad9d910 a2=0 a3=1 items=0 ppid=2262 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.263000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:21:46.264000 audit[2308]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.264000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd4d74cc0 a2=0 a3=1 items=0 ppid=2262 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.264000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:21:46.265000 audit[2311]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.265000 audit[2311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff69aa610 a2=0 a3=1 items=0 ppid=2262 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:21:46.362000 audit[2312]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.362000 audit[2312]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffcbad2a80 a2=0 a3=1 items=0 ppid=2262 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.362000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:21:46.366000 audit[2314]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.366000 audit[2314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd2b055a0 a2=0 a3=1 items=0 ppid=2262 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 10:21:46.369000 audit[2317]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.369000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd8889010 a2=0 a3=1 items=0 ppid=2262 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 10:21:46.370000 audit[2318]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.370000 audit[2318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdfcfea00 a2=0 a3=1 items=0 ppid=2262 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:21:46.377000 audit[2320]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.377000 audit[2320]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe4532720 a2=0 a3=1 items=0 ppid=2262 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.377000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:21:46.378000 audit[2321]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.378000 audit[2321]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffda4d60b0 a2=0 a3=1 items=0 ppid=2262 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.378000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:21:46.380000 audit[2323]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.380000 audit[2323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcada67e0 a2=0 a3=1 items=0 ppid=2262 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.380000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:21:46.384000 audit[2326]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.384000 audit[2326]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff8ce3fd0 a2=0 a3=1 items=0 ppid=2262 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.384000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 10:21:46.385000 audit[2327]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.385000 audit[2327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc0e8e8d0 a2=0 a3=1 items=0 ppid=2262 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:21:46.387000 audit[2329]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.387000 audit[2329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffce678c70 a2=0 a3=1 items=0 ppid=2262 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.387000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:21:46.388000 audit[2330]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.388000 audit[2330]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd3751c00 a2=0 a3=1 items=0 ppid=2262 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.388000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:21:46.391000 audit[2332]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.391000 audit[2332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc08210f0 a2=0 a3=1 items=0 ppid=2262 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.391000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:21:46.394000 audit[2335]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.394000 audit[2335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcb02ae90 a2=0 a3=1 items=0 ppid=2262 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.394000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:21:46.397000 audit[2338]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.397000 audit[2338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffb1d7f00 a2=0 a3=1 items=0 ppid=2262 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.397000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:21:46.399000 audit[2339]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.399000 audit[2339]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd7432390 a2=0 a3=1 items=0 ppid=2262 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.399000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:21:46.401000 audit[2341]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.401000 audit[2341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffef2873a0 a2=0 a3=1 items=0 ppid=2262 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.401000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:21:46.404000 audit[2344]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.404000 audit[2344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd41e21c0 a2=0 a3=1 items=0 ppid=2262 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.404000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:21:46.405000 audit[2345]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.405000 audit[2345]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe310b160 a2=0 a3=1 items=0 ppid=2262 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.405000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:21:46.407000 audit[2347]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:21:46.407000 audit[2347]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffd3ec5780 a2=0 a3=1 items=0 ppid=2262 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.407000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:21:46.428000 audit[2353]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:21:46.428000 audit[2353]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffda911ae0 a2=0 a3=1 items=0 ppid=2262 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:21:46.441000 audit[2353]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:21:46.441000 audit[2353]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffda911ae0 a2=0 a3=1 items=0 ppid=2262 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.441000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:21:46.442000 audit[2357]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.442000 audit[2357]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffed21d310 a2=0 a3=1 items=0 ppid=2262 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:21:46.444000 audit[2359]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.444000 audit[2359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff80fe620 a2=0 a3=1 items=0 ppid=2262 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.444000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 10:21:46.448000 audit[2362]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.448000 audit[2362]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe7444110 a2=0 a3=1 items=0 ppid=2262 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.448000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 10:21:46.448000 audit[2363]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.448000 audit[2363]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe6ff5710 a2=0 a3=1 items=0 ppid=2262 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.448000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:21:46.451000 audit[2365]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.451000 audit[2365]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc41da050 a2=0 a3=1 items=0 ppid=2262 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:21:46.452000 audit[2366]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.452000 audit[2366]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdecba620 a2=0 a3=1 items=0 ppid=2262 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.452000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:21:46.454000 audit[2368]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.454000 audit[2368]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdc94e650 a2=0 a3=1 items=0 ppid=2262 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 10:21:46.457000 audit[2371]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.457000 audit[2371]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff0e0f6e0 a2=0 a3=1 items=0 ppid=2262 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.457000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:21:46.458000 audit[2372]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.458000 audit[2372]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff6752570 a2=0 a3=1 items=0 ppid=2262 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:21:46.460000 audit[2374]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.460000 audit[2374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffc6dc6b0 a2=0 a3=1 items=0 ppid=2262 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:21:46.461000 audit[2375]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.461000 audit[2375]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd166fbc0 a2=0 a3=1 items=0 ppid=2262 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.461000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:21:46.464000 audit[2377]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.464000 audit[2377]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffee325530 a2=0 a3=1 items=0 ppid=2262 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.464000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:21:46.467000 audit[2380]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.467000 audit[2380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe25a46e0 a2=0 a3=1 items=0 ppid=2262 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.467000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:21:46.470000 audit[2383]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.470000 audit[2383]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc8cdcfc0 a2=0 a3=1 items=0 ppid=2262 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.470000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 10:21:46.471000 audit[2384]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.471000 audit[2384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd161c020 a2=0 a3=1 items=0 ppid=2262 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.471000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:21:46.473000 audit[2386]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.473000 audit[2386]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff4032480 a2=0 a3=1 items=0 ppid=2262 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.473000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:21:46.476000 audit[2389]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.476000 audit[2389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc3309400 a2=0 a3=1 items=0 ppid=2262 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.476000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:21:46.477000 audit[2390]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.477000 audit[2390]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd5b26b40 a2=0 a3=1 items=0 ppid=2262 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.477000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:21:46.479000 audit[2392]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.479000 audit[2392]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe2714b50 a2=0 a3=1 items=0 ppid=2262 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.479000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:21:46.480000 audit[2393]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.480000 audit[2393]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff6585990 a2=0 a3=1 items=0 ppid=2262 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.480000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:21:46.482000 audit[2395]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.482000 audit[2395]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe6da6770 a2=0 a3=1 items=0 ppid=2262 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.482000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:21:46.485000 audit[2398]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:21:46.485000 audit[2398]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffda178bc0 a2=0 a3=1 items=0 ppid=2262 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.485000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:21:46.488000 audit[2400]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:21:46.488000 audit[2400]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffc90828a0 a2=0 a3=1 items=0 ppid=2262 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.488000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:21:46.488000 audit[2400]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:21:46.488000 audit[2400]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc90828a0 a2=0 a3=1 items=0 ppid=2262 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:46.488000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:21:47.443260 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2708710625.mount: Deactivated successfully. May 15 10:21:48.565154 env[1217]: time="2025-05-15T10:21:48.565101016Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:48.566996 env[1217]: time="2025-05-15T10:21:48.566955624Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:48.568231 env[1217]: time="2025-05-15T10:21:48.568197683Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:48.569777 env[1217]: time="2025-05-15T10:21:48.569745377Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:48.570234 env[1217]: time="2025-05-15T10:21:48.570205289Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565\"" May 15 10:21:48.573253 env[1217]: time="2025-05-15T10:21:48.572864843Z" level=info msg="CreateContainer within sandbox \"73a277c8d8cf69d6ffcd0690d8a6d852df32fcdbe8031cef3c007ede884d3258\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 15 10:21:48.584342 env[1217]: time="2025-05-15T10:21:48.584293569Z" level=info msg="CreateContainer within sandbox \"73a277c8d8cf69d6ffcd0690d8a6d852df32fcdbe8031cef3c007ede884d3258\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"79f3eeaac9bd22cde54f34c0a06aef096d9e5fcb2adbd5d84d74fbf511d424b1\"" May 15 10:21:48.586085 env[1217]: time="2025-05-15T10:21:48.586050459Z" level=info msg="StartContainer for \"79f3eeaac9bd22cde54f34c0a06aef096d9e5fcb2adbd5d84d74fbf511d424b1\"" May 15 10:21:48.607110 systemd[1]: Started cri-containerd-79f3eeaac9bd22cde54f34c0a06aef096d9e5fcb2adbd5d84d74fbf511d424b1.scope. May 15 10:21:48.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit: BPF prog-id=114 op=LOAD May 15 10:21:48.639000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2158 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:48.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739663365656161633962643232636465353466333463306130366165 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2158 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:48.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739663365656161633962643232636465353466333463306130366165 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit: BPF prog-id=115 op=LOAD May 15 10:21:48.639000 audit[2409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2158 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:48.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739663365656161633962643232636465353466333463306130366165 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit: BPF prog-id=116 op=LOAD May 15 10:21:48.639000 audit[2409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2158 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:48.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739663365656161633962643232636465353466333463306130366165 May 15 10:21:48.639000 audit: BPF prog-id=116 op=UNLOAD May 15 10:21:48.639000 audit: BPF prog-id=115 op=UNLOAD May 15 10:21:48.639000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:48.639000 audit: BPF prog-id=117 op=LOAD May 15 10:21:48.639000 audit[2409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2158 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:48.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739663365656161633962643232636465353466333463306130366165 May 15 10:21:48.652005 env[1217]: time="2025-05-15T10:21:48.651962416Z" level=info msg="StartContainer for \"79f3eeaac9bd22cde54f34c0a06aef096d9e5fcb2adbd5d84d74fbf511d424b1\" returns successfully" May 15 10:21:49.194872 kubelet[2061]: I0515 10:21:49.194817 2061 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-whw8f" podStartSLOduration=5.194801482 podStartE2EDuration="5.194801482s" podCreationTimestamp="2025-05-15 10:21:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:21:46.187621096 +0000 UTC m=+15.153007924" watchObservedRunningTime="2025-05-15 10:21:49.194801482 +0000 UTC m=+18.160188310" May 15 10:21:49.195410 kubelet[2061]: I0515 10:21:49.195379 2061 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-g8nwh" podStartSLOduration=1.592349574 podStartE2EDuration="4.195370513s" podCreationTimestamp="2025-05-15 10:21:45 +0000 UTC" firstStartedPulling="2025-05-15 10:21:45.968433969 +0000 UTC m=+14.933820837" lastFinishedPulling="2025-05-15 10:21:48.571454948 +0000 UTC m=+17.536841776" observedRunningTime="2025-05-15 10:21:49.194687604 +0000 UTC m=+18.160074472" watchObservedRunningTime="2025-05-15 10:21:49.195370513 +0000 UTC m=+18.160757381" May 15 10:21:52.547000 audit[2444]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:21:52.551233 kernel: kauditd_printk_skb: 369 callbacks suppressed May 15 10:21:52.551291 kernel: audit: type=1325 audit(1747304512.547:938): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:21:52.547000 audit[2444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffdf4ff210 a2=0 a3=1 items=0 ppid=2262 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:52.555276 kernel: audit: type=1300 audit(1747304512.547:938): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffdf4ff210 a2=0 a3=1 items=0 ppid=2262 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:52.547000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:21:52.557253 kernel: audit: type=1327 audit(1747304512.547:938): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:21:52.561000 audit[2444]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:21:52.561000 audit[2444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffdf4ff210 a2=0 a3=1 items=0 ppid=2262 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:52.568170 kernel: audit: type=1325 audit(1747304512.561:939): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:21:52.568257 kernel: audit: type=1300 audit(1747304512.561:939): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffdf4ff210 a2=0 a3=1 items=0 ppid=2262 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:52.568325 kernel: audit: type=1327 audit(1747304512.561:939): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:21:52.561000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:21:52.582000 audit[2446]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:21:52.582000 audit[2446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff5c26210 a2=0 a3=1 items=0 ppid=2262 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:52.589314 kernel: audit: type=1325 audit(1747304512.582:940): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:21:52.589349 kernel: audit: type=1300 audit(1747304512.582:940): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff5c26210 a2=0 a3=1 items=0 ppid=2262 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:52.582000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:21:52.591178 kernel: audit: type=1327 audit(1747304512.582:940): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:21:52.592000 audit[2446]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:21:52.592000 audit[2446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff5c26210 a2=0 a3=1 items=0 ppid=2262 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:52.592000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:21:52.596179 kernel: audit: type=1325 audit(1747304512.592:941): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:21:52.733634 kubelet[2061]: I0515 10:21:52.733573 2061 topology_manager.go:215] "Topology Admit Handler" podUID="46446d22-1118-402f-bc12-d5ed4c5ab876" podNamespace="calico-system" podName="calico-typha-6dbbff98d9-mr876" May 15 10:21:52.738675 systemd[1]: Created slice kubepods-besteffort-pod46446d22_1118_402f_bc12_d5ed4c5ab876.slice. May 15 10:21:52.781841 kubelet[2061]: I0515 10:21:52.781796 2061 topology_manager.go:215] "Topology Admit Handler" podUID="3566b227-c823-408c-a111-d07bd049aa71" podNamespace="calico-system" podName="calico-node-4shrs" May 15 10:21:52.786746 systemd[1]: Created slice kubepods-besteffort-pod3566b227_c823_408c_a111_d07bd049aa71.slice. May 15 10:21:52.853425 kubelet[2061]: I0515 10:21:52.853391 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/46446d22-1118-402f-bc12-d5ed4c5ab876-typha-certs\") pod \"calico-typha-6dbbff98d9-mr876\" (UID: \"46446d22-1118-402f-bc12-d5ed4c5ab876\") " pod="calico-system/calico-typha-6dbbff98d9-mr876" May 15 10:21:52.853569 kubelet[2061]: I0515 10:21:52.853434 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9r9zv\" (UniqueName: \"kubernetes.io/projected/46446d22-1118-402f-bc12-d5ed4c5ab876-kube-api-access-9r9zv\") pod \"calico-typha-6dbbff98d9-mr876\" (UID: \"46446d22-1118-402f-bc12-d5ed4c5ab876\") " pod="calico-system/calico-typha-6dbbff98d9-mr876" May 15 10:21:52.853569 kubelet[2061]: I0515 10:21:52.853458 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/46446d22-1118-402f-bc12-d5ed4c5ab876-tigera-ca-bundle\") pod \"calico-typha-6dbbff98d9-mr876\" (UID: \"46446d22-1118-402f-bc12-d5ed4c5ab876\") " pod="calico-system/calico-typha-6dbbff98d9-mr876" May 15 10:21:52.891704 kubelet[2061]: I0515 10:21:52.891652 2061 topology_manager.go:215] "Topology Admit Handler" podUID="ef184343-07cc-49e8-9335-04743ecda65a" podNamespace="calico-system" podName="csi-node-driver-2lh5x" May 15 10:21:52.891937 kubelet[2061]: E0515 10:21:52.891901 2061 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lh5x" podUID="ef184343-07cc-49e8-9335-04743ecda65a" May 15 10:21:52.953741 kubelet[2061]: I0515 10:21:52.953692 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3566b227-c823-408c-a111-d07bd049aa71-var-run-calico\") pod \"calico-node-4shrs\" (UID: \"3566b227-c823-408c-a111-d07bd049aa71\") " pod="calico-system/calico-node-4shrs" May 15 10:21:52.953741 kubelet[2061]: I0515 10:21:52.953750 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3566b227-c823-408c-a111-d07bd049aa71-tigera-ca-bundle\") pod \"calico-node-4shrs\" (UID: \"3566b227-c823-408c-a111-d07bd049aa71\") " pod="calico-system/calico-node-4shrs" May 15 10:21:52.953920 kubelet[2061]: I0515 10:21:52.953783 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3566b227-c823-408c-a111-d07bd049aa71-cni-bin-dir\") pod \"calico-node-4shrs\" (UID: \"3566b227-c823-408c-a111-d07bd049aa71\") " pod="calico-system/calico-node-4shrs" May 15 10:21:52.953920 kubelet[2061]: I0515 10:21:52.953804 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3566b227-c823-408c-a111-d07bd049aa71-policysync\") pod \"calico-node-4shrs\" (UID: \"3566b227-c823-408c-a111-d07bd049aa71\") " pod="calico-system/calico-node-4shrs" May 15 10:21:52.953920 kubelet[2061]: I0515 10:21:52.953819 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3566b227-c823-408c-a111-d07bd049aa71-var-lib-calico\") pod \"calico-node-4shrs\" (UID: \"3566b227-c823-408c-a111-d07bd049aa71\") " pod="calico-system/calico-node-4shrs" May 15 10:21:52.953920 kubelet[2061]: I0515 10:21:52.953837 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3566b227-c823-408c-a111-d07bd049aa71-cni-log-dir\") pod \"calico-node-4shrs\" (UID: \"3566b227-c823-408c-a111-d07bd049aa71\") " pod="calico-system/calico-node-4shrs" May 15 10:21:52.953920 kubelet[2061]: I0515 10:21:52.953875 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3566b227-c823-408c-a111-d07bd049aa71-node-certs\") pod \"calico-node-4shrs\" (UID: \"3566b227-c823-408c-a111-d07bd049aa71\") " pod="calico-system/calico-node-4shrs" May 15 10:21:52.954054 kubelet[2061]: I0515 10:21:52.953890 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3566b227-c823-408c-a111-d07bd049aa71-lib-modules\") pod \"calico-node-4shrs\" (UID: \"3566b227-c823-408c-a111-d07bd049aa71\") " pod="calico-system/calico-node-4shrs" May 15 10:21:52.954054 kubelet[2061]: I0515 10:21:52.953904 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3566b227-c823-408c-a111-d07bd049aa71-xtables-lock\") pod \"calico-node-4shrs\" (UID: \"3566b227-c823-408c-a111-d07bd049aa71\") " pod="calico-system/calico-node-4shrs" May 15 10:21:52.954054 kubelet[2061]: I0515 10:21:52.953922 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hgm5h\" (UniqueName: \"kubernetes.io/projected/3566b227-c823-408c-a111-d07bd049aa71-kube-api-access-hgm5h\") pod \"calico-node-4shrs\" (UID: \"3566b227-c823-408c-a111-d07bd049aa71\") " pod="calico-system/calico-node-4shrs" May 15 10:21:52.954054 kubelet[2061]: I0515 10:21:52.953939 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3566b227-c823-408c-a111-d07bd049aa71-flexvol-driver-host\") pod \"calico-node-4shrs\" (UID: \"3566b227-c823-408c-a111-d07bd049aa71\") " pod="calico-system/calico-node-4shrs" May 15 10:21:52.954054 kubelet[2061]: I0515 10:21:52.953956 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3566b227-c823-408c-a111-d07bd049aa71-cni-net-dir\") pod \"calico-node-4shrs\" (UID: \"3566b227-c823-408c-a111-d07bd049aa71\") " pod="calico-system/calico-node-4shrs" May 15 10:21:53.041415 kubelet[2061]: E0515 10:21:53.041382 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:53.042025 env[1217]: time="2025-05-15T10:21:53.041985729Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6dbbff98d9-mr876,Uid:46446d22-1118-402f-bc12-d5ed4c5ab876,Namespace:calico-system,Attempt:0,}" May 15 10:21:53.057888 kubelet[2061]: I0515 10:21:53.055152 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ef184343-07cc-49e8-9335-04743ecda65a-kubelet-dir\") pod \"csi-node-driver-2lh5x\" (UID: \"ef184343-07cc-49e8-9335-04743ecda65a\") " pod="calico-system/csi-node-driver-2lh5x" May 15 10:21:53.057888 kubelet[2061]: E0515 10:21:53.055647 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.057888 kubelet[2061]: W0515 10:21:53.055662 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.057888 kubelet[2061]: E0515 10:21:53.055679 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.057888 kubelet[2061]: E0515 10:21:53.055833 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.057888 kubelet[2061]: W0515 10:21:53.055841 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.057888 kubelet[2061]: E0515 10:21:53.055850 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.057888 kubelet[2061]: E0515 10:21:53.056003 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.057888 kubelet[2061]: W0515 10:21:53.056009 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.058174 kubelet[2061]: E0515 10:21:53.056017 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.058174 kubelet[2061]: E0515 10:21:53.056820 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.058174 kubelet[2061]: W0515 10:21:53.056833 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.058174 kubelet[2061]: E0515 10:21:53.056844 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.058331 kubelet[2061]: E0515 10:21:53.058200 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.058331 kubelet[2061]: W0515 10:21:53.058214 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.058331 kubelet[2061]: E0515 10:21:53.058227 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.058331 kubelet[2061]: I0515 10:21:53.058256 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ef184343-07cc-49e8-9335-04743ecda65a-registration-dir\") pod \"csi-node-driver-2lh5x\" (UID: \"ef184343-07cc-49e8-9335-04743ecda65a\") " pod="calico-system/csi-node-driver-2lh5x" May 15 10:21:53.058527 kubelet[2061]: E0515 10:21:53.058485 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.058527 kubelet[2061]: W0515 10:21:53.058500 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.058527 kubelet[2061]: E0515 10:21:53.058511 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.059278 kubelet[2061]: E0515 10:21:53.059260 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.059278 kubelet[2061]: W0515 10:21:53.059276 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.059367 kubelet[2061]: E0515 10:21:53.059290 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.059367 kubelet[2061]: I0515 10:21:53.059308 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ef184343-07cc-49e8-9335-04743ecda65a-socket-dir\") pod \"csi-node-driver-2lh5x\" (UID: \"ef184343-07cc-49e8-9335-04743ecda65a\") " pod="calico-system/csi-node-driver-2lh5x" May 15 10:21:53.059554 kubelet[2061]: E0515 10:21:53.059538 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.059554 kubelet[2061]: W0515 10:21:53.059553 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.059628 kubelet[2061]: E0515 10:21:53.059567 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.059908 kubelet[2061]: E0515 10:21:53.059891 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.059908 kubelet[2061]: W0515 10:21:53.059906 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.060029 kubelet[2061]: E0515 10:21:53.060012 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.061586 kubelet[2061]: E0515 10:21:53.061565 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.061586 kubelet[2061]: W0515 10:21:53.061583 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.061687 kubelet[2061]: E0515 10:21:53.061621 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.061781 kubelet[2061]: E0515 10:21:53.061764 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.061781 kubelet[2061]: W0515 10:21:53.061778 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.061886 kubelet[2061]: E0515 10:21:53.061870 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.061965 kubelet[2061]: E0515 10:21:53.061950 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.061965 kubelet[2061]: W0515 10:21:53.061963 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.062052 kubelet[2061]: E0515 10:21:53.062037 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.062105 kubelet[2061]: E0515 10:21:53.062094 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.062105 kubelet[2061]: W0515 10:21:53.062104 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.062188 kubelet[2061]: E0515 10:21:53.062173 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.062267 kubelet[2061]: E0515 10:21:53.062254 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.062267 kubelet[2061]: W0515 10:21:53.062265 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.062351 kubelet[2061]: E0515 10:21:53.062337 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.062426 kubelet[2061]: E0515 10:21:53.062410 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.062426 kubelet[2061]: W0515 10:21:53.062420 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.062486 kubelet[2061]: E0515 10:21:53.062445 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.062571 kubelet[2061]: E0515 10:21:53.062560 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.062571 kubelet[2061]: W0515 10:21:53.062571 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.062641 kubelet[2061]: E0515 10:21:53.062582 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.062825 kubelet[2061]: E0515 10:21:53.062808 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.062825 kubelet[2061]: W0515 10:21:53.062820 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.062879 kubelet[2061]: E0515 10:21:53.062832 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.063287 kubelet[2061]: E0515 10:21:53.063034 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.063287 kubelet[2061]: W0515 10:21:53.063044 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.063287 kubelet[2061]: E0515 10:21:53.063056 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.063421 env[1217]: time="2025-05-15T10:21:53.062993885Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:21:53.063421 env[1217]: time="2025-05-15T10:21:53.063058084Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:21:53.063421 env[1217]: time="2025-05-15T10:21:53.063071484Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:21:53.063495 kubelet[2061]: E0515 10:21:53.063323 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.063495 kubelet[2061]: W0515 10:21:53.063332 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.063495 kubelet[2061]: E0515 10:21:53.063340 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.063566 kubelet[2061]: E0515 10:21:53.063532 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.063566 kubelet[2061]: W0515 10:21:53.063541 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.063566 kubelet[2061]: E0515 10:21:53.063549 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.063665 env[1217]: time="2025-05-15T10:21:53.063464839Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cd0b668623017f86d3ffed7d86b361477e551828ed2a94cc0df16193fb4ca5be pid=2463 runtime=io.containerd.runc.v2 May 15 10:21:53.063815 kubelet[2061]: E0515 10:21:53.063797 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.063815 kubelet[2061]: W0515 10:21:53.063811 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.063896 kubelet[2061]: E0515 10:21:53.063862 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.064119 kubelet[2061]: E0515 10:21:53.064080 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.064119 kubelet[2061]: W0515 10:21:53.064092 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.064228 kubelet[2061]: E0515 10:21:53.064177 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.065242 kubelet[2061]: E0515 10:21:53.064366 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.065242 kubelet[2061]: W0515 10:21:53.064380 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.065242 kubelet[2061]: E0515 10:21:53.064468 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.065242 kubelet[2061]: I0515 10:21:53.064491 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8dkq8\" (UniqueName: \"kubernetes.io/projected/ef184343-07cc-49e8-9335-04743ecda65a-kube-api-access-8dkq8\") pod \"csi-node-driver-2lh5x\" (UID: \"ef184343-07cc-49e8-9335-04743ecda65a\") " pod="calico-system/csi-node-driver-2lh5x" May 15 10:21:53.067291 kubelet[2061]: E0515 10:21:53.066699 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.067291 kubelet[2061]: W0515 10:21:53.066714 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.067291 kubelet[2061]: E0515 10:21:53.066870 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.067291 kubelet[2061]: W0515 10:21:53.066877 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.067432 kubelet[2061]: E0515 10:21:53.067357 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.067432 kubelet[2061]: E0515 10:21:53.067383 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.068527 kubelet[2061]: E0515 10:21:53.068511 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.068527 kubelet[2061]: W0515 10:21:53.068526 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.068608 kubelet[2061]: E0515 10:21:53.068544 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.068760 kubelet[2061]: E0515 10:21:53.068745 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.068760 kubelet[2061]: W0515 10:21:53.068758 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.068850 kubelet[2061]: E0515 10:21:53.068772 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.068998 kubelet[2061]: E0515 10:21:53.068984 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.068998 kubelet[2061]: W0515 10:21:53.068998 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.069078 kubelet[2061]: E0515 10:21:53.069043 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.069229 kubelet[2061]: E0515 10:21:53.069213 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.069229 kubelet[2061]: W0515 10:21:53.069227 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.069327 kubelet[2061]: E0515 10:21:53.069292 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.069438 kubelet[2061]: E0515 10:21:53.069420 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.069438 kubelet[2061]: W0515 10:21:53.069433 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.069493 kubelet[2061]: E0515 10:21:53.069477 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.071257 kubelet[2061]: E0515 10:21:53.071231 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.071257 kubelet[2061]: W0515 10:21:53.071254 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.071384 kubelet[2061]: E0515 10:21:53.071364 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.071467 kubelet[2061]: E0515 10:21:53.071450 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.071467 kubelet[2061]: W0515 10:21:53.071464 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.071548 kubelet[2061]: E0515 10:21:53.071534 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.071623 kubelet[2061]: E0515 10:21:53.071608 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.071623 kubelet[2061]: W0515 10:21:53.071620 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.071696 kubelet[2061]: E0515 10:21:53.071635 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.071826 kubelet[2061]: E0515 10:21:53.071814 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.071826 kubelet[2061]: W0515 10:21:53.071825 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.071894 kubelet[2061]: E0515 10:21:53.071839 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.072004 kubelet[2061]: E0515 10:21:53.071991 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.072004 kubelet[2061]: W0515 10:21:53.072001 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.072078 kubelet[2061]: E0515 10:21:53.072015 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.072198 kubelet[2061]: E0515 10:21:53.072186 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.072198 kubelet[2061]: W0515 10:21:53.072197 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.072286 kubelet[2061]: E0515 10:21:53.072210 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.072410 kubelet[2061]: E0515 10:21:53.072399 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.072410 kubelet[2061]: W0515 10:21:53.072409 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.072479 kubelet[2061]: E0515 10:21:53.072422 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.072479 kubelet[2061]: I0515 10:21:53.072437 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ef184343-07cc-49e8-9335-04743ecda65a-varrun\") pod \"csi-node-driver-2lh5x\" (UID: \"ef184343-07cc-49e8-9335-04743ecda65a\") " pod="calico-system/csi-node-driver-2lh5x" May 15 10:21:53.072675 kubelet[2061]: E0515 10:21:53.072659 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.072675 kubelet[2061]: W0515 10:21:53.072673 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.072823 kubelet[2061]: E0515 10:21:53.072689 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.072883 kubelet[2061]: E0515 10:21:53.072862 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.072883 kubelet[2061]: W0515 10:21:53.072876 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.072977 kubelet[2061]: E0515 10:21:53.072952 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.073065 kubelet[2061]: E0515 10:21:53.073054 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.073107 kubelet[2061]: W0515 10:21:53.073067 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.073107 kubelet[2061]: E0515 10:21:53.073090 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.073279 kubelet[2061]: E0515 10:21:53.073268 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.073279 kubelet[2061]: W0515 10:21:53.073278 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.073406 kubelet[2061]: E0515 10:21:53.073387 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.073490 kubelet[2061]: E0515 10:21:53.073420 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.073557 kubelet[2061]: W0515 10:21:53.073542 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.073653 kubelet[2061]: E0515 10:21:53.073634 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.073874 kubelet[2061]: E0515 10:21:53.073856 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.074085 kubelet[2061]: W0515 10:21:53.074037 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.074294 kubelet[2061]: E0515 10:21:53.074275 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.074704 kubelet[2061]: E0515 10:21:53.074689 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.074877 kubelet[2061]: W0515 10:21:53.074857 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.075032 kubelet[2061]: E0515 10:21:53.075017 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.075612 kubelet[2061]: E0515 10:21:53.075507 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.075803 kubelet[2061]: W0515 10:21:53.075701 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.075971 kubelet[2061]: E0515 10:21:53.075957 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.076102 kubelet[2061]: E0515 10:21:53.076092 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.076191 kubelet[2061]: W0515 10:21:53.076176 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.076349 kubelet[2061]: E0515 10:21:53.076336 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.076459 kubelet[2061]: E0515 10:21:53.076450 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.076516 kubelet[2061]: W0515 10:21:53.076505 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.076656 kubelet[2061]: E0515 10:21:53.076643 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.076777 kubelet[2061]: E0515 10:21:53.076768 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.076835 kubelet[2061]: W0515 10:21:53.076824 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.077021 kubelet[2061]: E0515 10:21:53.077008 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.077141 kubelet[2061]: E0515 10:21:53.077131 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.077245 kubelet[2061]: W0515 10:21:53.077223 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.077309 kubelet[2061]: E0515 10:21:53.077297 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.077528 kubelet[2061]: E0515 10:21:53.077516 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.077619 kubelet[2061]: W0515 10:21:53.077606 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.078612 kubelet[2061]: E0515 10:21:53.078208 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.078870 kubelet[2061]: E0515 10:21:53.078856 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.078947 kubelet[2061]: W0515 10:21:53.078934 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.079037 kubelet[2061]: E0515 10:21:53.079017 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.079521 kubelet[2061]: E0515 10:21:53.079508 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.079608 kubelet[2061]: W0515 10:21:53.079595 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.079777 kubelet[2061]: E0515 10:21:53.079762 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.080495 systemd[1]: Started cri-containerd-cd0b668623017f86d3ffed7d86b361477e551828ed2a94cc0df16193fb4ca5be.scope. May 15 10:21:53.083380 kubelet[2061]: E0515 10:21:53.083364 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.083467 kubelet[2061]: W0515 10:21:53.083443 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.083649 kubelet[2061]: E0515 10:21:53.083636 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.083960 kubelet[2061]: E0515 10:21:53.083949 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.084040 kubelet[2061]: W0515 10:21:53.084026 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.084646 kubelet[2061]: E0515 10:21:53.084629 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.085397 kubelet[2061]: E0515 10:21:53.085372 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.085492 kubelet[2061]: W0515 10:21:53.085477 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.085595 kubelet[2061]: E0515 10:21:53.085572 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.085802 kubelet[2061]: E0515 10:21:53.085789 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.085893 kubelet[2061]: W0515 10:21:53.085881 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.086048 kubelet[2061]: E0515 10:21:53.086034 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.086334 kubelet[2061]: E0515 10:21:53.086320 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.086429 kubelet[2061]: W0515 10:21:53.086416 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.086509 kubelet[2061]: E0515 10:21:53.086495 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.099506 kubelet[2061]: E0515 10:21:53.099486 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.099635 kubelet[2061]: W0515 10:21:53.099621 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.099697 kubelet[2061]: E0515 10:21:53.099684 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.107000 audit: BPF prog-id=118 op=LOAD May 15 10:21:53.108000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2463 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:53.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364306236363836323330313766383664336666656437643836623336 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2463 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:53.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364306236363836323330313766383664336666656437643836623336 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit: BPF prog-id=119 op=LOAD May 15 10:21:53.108000 audit[2489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2463 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:53.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364306236363836323330313766383664336666656437643836623336 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit: BPF prog-id=120 op=LOAD May 15 10:21:53.108000 audit[2489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2463 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:53.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364306236363836323330313766383664336666656437643836623336 May 15 10:21:53.108000 audit: BPF prog-id=120 op=UNLOAD May 15 10:21:53.108000 audit: BPF prog-id=119 op=UNLOAD May 15 10:21:53.108000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.108000 audit: BPF prog-id=121 op=LOAD May 15 10:21:53.108000 audit[2489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2463 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:53.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364306236363836323330313766383664336666656437643836623336 May 15 10:21:53.128328 env[1217]: time="2025-05-15T10:21:53.128291044Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6dbbff98d9-mr876,Uid:46446d22-1118-402f-bc12-d5ed4c5ab876,Namespace:calico-system,Attempt:0,} returns sandbox id \"cd0b668623017f86d3ffed7d86b361477e551828ed2a94cc0df16193fb4ca5be\"" May 15 10:21:53.129480 kubelet[2061]: E0515 10:21:53.128945 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:53.129914 env[1217]: time="2025-05-15T10:21:53.129882942Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 15 10:21:53.173668 kubelet[2061]: E0515 10:21:53.173570 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.173668 kubelet[2061]: W0515 10:21:53.173588 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.173668 kubelet[2061]: E0515 10:21:53.173606 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.173850 kubelet[2061]: E0515 10:21:53.173828 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.173850 kubelet[2061]: W0515 10:21:53.173837 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.173850 kubelet[2061]: E0515 10:21:53.173847 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.174064 kubelet[2061]: E0515 10:21:53.174051 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.174064 kubelet[2061]: W0515 10:21:53.174064 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.174140 kubelet[2061]: E0515 10:21:53.174077 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.174285 kubelet[2061]: E0515 10:21:53.174257 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.174285 kubelet[2061]: W0515 10:21:53.174271 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.174285 kubelet[2061]: E0515 10:21:53.174281 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.174467 kubelet[2061]: E0515 10:21:53.174443 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.174467 kubelet[2061]: W0515 10:21:53.174457 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.174467 kubelet[2061]: E0515 10:21:53.174467 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.174668 kubelet[2061]: E0515 10:21:53.174642 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.174668 kubelet[2061]: W0515 10:21:53.174654 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.174668 kubelet[2061]: E0515 10:21:53.174665 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.174828 kubelet[2061]: E0515 10:21:53.174817 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.174828 kubelet[2061]: W0515 10:21:53.174827 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.174874 kubelet[2061]: E0515 10:21:53.174835 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.175001 kubelet[2061]: E0515 10:21:53.174987 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.175030 kubelet[2061]: W0515 10:21:53.175001 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.175054 kubelet[2061]: E0515 10:21:53.175030 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.175148 kubelet[2061]: E0515 10:21:53.175135 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.175148 kubelet[2061]: W0515 10:21:53.175146 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.175248 kubelet[2061]: E0515 10:21:53.175227 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.175339 kubelet[2061]: E0515 10:21:53.175328 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.175339 kubelet[2061]: W0515 10:21:53.175338 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.175420 kubelet[2061]: E0515 10:21:53.175406 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.175482 kubelet[2061]: E0515 10:21:53.175472 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.175482 kubelet[2061]: W0515 10:21:53.175481 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.175558 kubelet[2061]: E0515 10:21:53.175544 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.175620 kubelet[2061]: E0515 10:21:53.175610 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.175620 kubelet[2061]: W0515 10:21:53.175619 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.175734 kubelet[2061]: E0515 10:21:53.175703 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.175775 kubelet[2061]: E0515 10:21:53.175769 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.175802 kubelet[2061]: W0515 10:21:53.175775 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.175802 kubelet[2061]: E0515 10:21:53.175787 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.176940 kubelet[2061]: E0515 10:21:53.176922 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.176940 kubelet[2061]: W0515 10:21:53.176938 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.177044 kubelet[2061]: E0515 10:21:53.176955 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.177145 kubelet[2061]: E0515 10:21:53.177129 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.177145 kubelet[2061]: W0515 10:21:53.177141 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.177224 kubelet[2061]: E0515 10:21:53.177182 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.177606 kubelet[2061]: E0515 10:21:53.177591 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.177606 kubelet[2061]: W0515 10:21:53.177605 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.177685 kubelet[2061]: E0515 10:21:53.177653 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.181198 kubelet[2061]: E0515 10:21:53.177994 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.181198 kubelet[2061]: W0515 10:21:53.178009 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.181198 kubelet[2061]: E0515 10:21:53.178080 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.181198 kubelet[2061]: E0515 10:21:53.178221 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.181198 kubelet[2061]: W0515 10:21:53.178231 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.181198 kubelet[2061]: E0515 10:21:53.178306 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.181198 kubelet[2061]: E0515 10:21:53.178429 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.181198 kubelet[2061]: W0515 10:21:53.178438 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.181198 kubelet[2061]: E0515 10:21:53.178472 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.181198 kubelet[2061]: E0515 10:21:53.178559 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.181538 kubelet[2061]: W0515 10:21:53.178566 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.181538 kubelet[2061]: E0515 10:21:53.178576 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.181538 kubelet[2061]: E0515 10:21:53.178741 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.181538 kubelet[2061]: W0515 10:21:53.178748 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.181538 kubelet[2061]: E0515 10:21:53.178756 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.181538 kubelet[2061]: E0515 10:21:53.178891 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.181538 kubelet[2061]: W0515 10:21:53.178898 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.181538 kubelet[2061]: E0515 10:21:53.178906 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.181538 kubelet[2061]: E0515 10:21:53.179048 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.181538 kubelet[2061]: W0515 10:21:53.179055 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.181820 kubelet[2061]: E0515 10:21:53.179064 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.181820 kubelet[2061]: E0515 10:21:53.179198 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.181820 kubelet[2061]: W0515 10:21:53.179205 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.181820 kubelet[2061]: E0515 10:21:53.179213 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.181820 kubelet[2061]: E0515 10:21:53.179519 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.181820 kubelet[2061]: W0515 10:21:53.179529 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.181820 kubelet[2061]: E0515 10:21:53.179538 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.186131 kubelet[2061]: E0515 10:21:53.186114 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:53.186257 kubelet[2061]: W0515 10:21:53.186241 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:53.186321 kubelet[2061]: E0515 10:21:53.186309 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:53.389684 kubelet[2061]: E0515 10:21:53.389585 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:53.391992 env[1217]: time="2025-05-15T10:21:53.390487583Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4shrs,Uid:3566b227-c823-408c-a111-d07bd049aa71,Namespace:calico-system,Attempt:0,}" May 15 10:21:53.403726 env[1217]: time="2025-05-15T10:21:53.403653925Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:21:53.403726 env[1217]: time="2025-05-15T10:21:53.403696965Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:21:53.403726 env[1217]: time="2025-05-15T10:21:53.403707405Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:21:53.405402 env[1217]: time="2025-05-15T10:21:53.405348663Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4d4619b66d5745784376c715a9b2319fd422604a6eea57d9e54a231d38239a29 pid=2585 runtime=io.containerd.runc.v2 May 15 10:21:53.415468 systemd[1]: Started cri-containerd-4d4619b66d5745784376c715a9b2319fd422604a6eea57d9e54a231d38239a29.scope. May 15 10:21:53.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.428000 audit: BPF prog-id=122 op=LOAD May 15 10:21:53.428000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.428000 audit[2595]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2585 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:53.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464343631396236366435373435373834333736633731356139623233 May 15 10:21:53.429000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.429000 audit[2595]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2585 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:53.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464343631396236366435373435373834333736633731356139623233 May 15 10:21:53.429000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.429000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.429000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.429000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.429000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.429000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.429000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.429000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.429000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.429000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.429000 audit: BPF prog-id=123 op=LOAD May 15 10:21:53.429000 audit[2595]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2585 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:53.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464343631396236366435373435373834333736633731356139623233 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit: BPF prog-id=124 op=LOAD May 15 10:21:53.430000 audit[2595]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2585 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:53.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464343631396236366435373435373834333736633731356139623233 May 15 10:21:53.430000 audit: BPF prog-id=124 op=UNLOAD May 15 10:21:53.430000 audit: BPF prog-id=123 op=UNLOAD May 15 10:21:53.430000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { perfmon } for pid=2595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit[2595]: AVC avc: denied { bpf } for pid=2595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:53.430000 audit: BPF prog-id=125 op=LOAD May 15 10:21:53.430000 audit[2595]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2585 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:53.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464343631396236366435373435373834333736633731356139623233 May 15 10:21:53.441267 env[1217]: time="2025-05-15T10:21:53.441221498Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4shrs,Uid:3566b227-c823-408c-a111-d07bd049aa71,Namespace:calico-system,Attempt:0,} returns sandbox id \"4d4619b66d5745784376c715a9b2319fd422604a6eea57d9e54a231d38239a29\"" May 15 10:21:53.442333 kubelet[2061]: E0515 10:21:53.441835 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:53.609000 audit[2619]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:21:53.609000 audit[2619]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=ffffd2095ae0 a2=0 a3=1 items=0 ppid=2262 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:53.609000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:21:53.628000 audit[2619]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:21:53.628000 audit[2619]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd2095ae0 a2=0 a3=1 items=0 ppid=2262 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:53.628000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:21:53.961736 systemd[1]: run-containerd-runc-k8s.io-cd0b668623017f86d3ffed7d86b361477e551828ed2a94cc0df16193fb4ca5be-runc.mP7Qzh.mount: Deactivated successfully. May 15 10:21:54.133406 kubelet[2061]: E0515 10:21:54.133362 2061 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lh5x" podUID="ef184343-07cc-49e8-9335-04743ecda65a" May 15 10:21:54.848176 env[1217]: time="2025-05-15T10:21:54.848104633Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:54.849617 env[1217]: time="2025-05-15T10:21:54.849578174Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:54.851348 env[1217]: time="2025-05-15T10:21:54.851317272Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:54.853041 env[1217]: time="2025-05-15T10:21:54.853006490Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:54.853485 env[1217]: time="2025-05-15T10:21:54.853443804Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54\"" May 15 10:21:54.860123 env[1217]: time="2025-05-15T10:21:54.859054372Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 10:21:54.873941 env[1217]: time="2025-05-15T10:21:54.873906580Z" level=info msg="CreateContainer within sandbox \"cd0b668623017f86d3ffed7d86b361477e551828ed2a94cc0df16193fb4ca5be\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 15 10:21:54.886908 env[1217]: time="2025-05-15T10:21:54.886860172Z" level=info msg="CreateContainer within sandbox \"cd0b668623017f86d3ffed7d86b361477e551828ed2a94cc0df16193fb4ca5be\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"d3a5c9649c04d688af9bb3c0a13360cfe26d02c7dbdb231df76cf7227d7ffb95\"" May 15 10:21:54.889241 env[1217]: time="2025-05-15T10:21:54.889178062Z" level=info msg="StartContainer for \"d3a5c9649c04d688af9bb3c0a13360cfe26d02c7dbdb231df76cf7227d7ffb95\"" May 15 10:21:54.910289 systemd[1]: Started cri-containerd-d3a5c9649c04d688af9bb3c0a13360cfe26d02c7dbdb231df76cf7227d7ffb95.scope. May 15 10:21:54.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.938000 audit: BPF prog-id=126 op=LOAD May 15 10:21:54.940000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.940000 audit[2630]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2463 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:54.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433613563393634396330346436383861663962623363306131333336 May 15 10:21:54.940000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.940000 audit[2630]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2463 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:54.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433613563393634396330346436383861663962623363306131333336 May 15 10:21:54.940000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.940000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.940000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.940000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.940000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.940000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.940000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.940000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.940000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.940000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.940000 audit: BPF prog-id=127 op=LOAD May 15 10:21:54.940000 audit[2630]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2463 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:54.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433613563393634396330346436383861663962623363306131333336 May 15 10:21:54.941000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.941000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.941000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.941000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.941000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.941000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.941000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.941000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.941000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.941000 audit: BPF prog-id=128 op=LOAD May 15 10:21:54.941000 audit[2630]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2463 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:54.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433613563393634396330346436383861663962623363306131333336 May 15 10:21:54.942000 audit: BPF prog-id=128 op=UNLOAD May 15 10:21:54.942000 audit: BPF prog-id=127 op=UNLOAD May 15 10:21:54.942000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.942000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.942000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.942000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.942000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.942000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.942000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.942000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.942000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.942000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:54.942000 audit: BPF prog-id=129 op=LOAD May 15 10:21:54.942000 audit[2630]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2463 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:54.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433613563393634396330346436383861663962623363306131333336 May 15 10:21:54.979948 env[1217]: time="2025-05-15T10:21:54.979845291Z" level=info msg="StartContainer for \"d3a5c9649c04d688af9bb3c0a13360cfe26d02c7dbdb231df76cf7227d7ffb95\" returns successfully" May 15 10:21:55.196917 kubelet[2061]: E0515 10:21:55.196536 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:55.275155 kubelet[2061]: E0515 10:21:55.275126 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.275353 kubelet[2061]: W0515 10:21:55.275336 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.275445 kubelet[2061]: E0515 10:21:55.275431 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.275693 kubelet[2061]: E0515 10:21:55.275681 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.275785 kubelet[2061]: W0515 10:21:55.275773 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.275863 kubelet[2061]: E0515 10:21:55.275852 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.276141 kubelet[2061]: E0515 10:21:55.276127 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.276251 kubelet[2061]: W0515 10:21:55.276237 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.276337 kubelet[2061]: E0515 10:21:55.276325 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.276574 kubelet[2061]: E0515 10:21:55.276562 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.276659 kubelet[2061]: W0515 10:21:55.276648 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.276729 kubelet[2061]: E0515 10:21:55.276709 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.276958 kubelet[2061]: E0515 10:21:55.276939 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.277042 kubelet[2061]: W0515 10:21:55.277019 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.277117 kubelet[2061]: E0515 10:21:55.277097 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.277354 kubelet[2061]: E0515 10:21:55.277342 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.277445 kubelet[2061]: W0515 10:21:55.277433 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.277514 kubelet[2061]: E0515 10:21:55.277492 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.277710 kubelet[2061]: E0515 10:21:55.277698 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.277792 kubelet[2061]: W0515 10:21:55.277781 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.277866 kubelet[2061]: E0515 10:21:55.277855 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.278065 kubelet[2061]: E0515 10:21:55.278053 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.278140 kubelet[2061]: W0515 10:21:55.278129 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.278237 kubelet[2061]: E0515 10:21:55.278225 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.278475 kubelet[2061]: E0515 10:21:55.278463 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.278561 kubelet[2061]: W0515 10:21:55.278549 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.278633 kubelet[2061]: E0515 10:21:55.278623 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.278931 kubelet[2061]: E0515 10:21:55.278917 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.279014 kubelet[2061]: W0515 10:21:55.279002 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.279075 kubelet[2061]: E0515 10:21:55.279063 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.279324 kubelet[2061]: E0515 10:21:55.279311 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.279408 kubelet[2061]: W0515 10:21:55.279395 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.279474 kubelet[2061]: E0515 10:21:55.279462 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.279735 kubelet[2061]: E0515 10:21:55.279722 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.279810 kubelet[2061]: W0515 10:21:55.279798 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.279862 kubelet[2061]: E0515 10:21:55.279852 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.280104 kubelet[2061]: E0515 10:21:55.280092 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.280225 kubelet[2061]: W0515 10:21:55.280211 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.280309 kubelet[2061]: E0515 10:21:55.280297 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.280537 kubelet[2061]: E0515 10:21:55.280524 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.280612 kubelet[2061]: W0515 10:21:55.280599 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.280704 kubelet[2061]: E0515 10:21:55.280684 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.280928 kubelet[2061]: E0515 10:21:55.280916 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.281005 kubelet[2061]: W0515 10:21:55.280994 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.281065 kubelet[2061]: E0515 10:21:55.281053 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.292299 kubelet[2061]: E0515 10:21:55.292279 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.292299 kubelet[2061]: W0515 10:21:55.292299 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.292424 kubelet[2061]: E0515 10:21:55.292313 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.292604 kubelet[2061]: E0515 10:21:55.292575 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.292682 kubelet[2061]: W0515 10:21:55.292659 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.292766 kubelet[2061]: E0515 10:21:55.292755 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.293022 kubelet[2061]: E0515 10:21:55.293009 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.293022 kubelet[2061]: W0515 10:21:55.293023 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.293105 kubelet[2061]: E0515 10:21:55.293043 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.293254 kubelet[2061]: E0515 10:21:55.293243 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.293254 kubelet[2061]: W0515 10:21:55.293254 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.293383 kubelet[2061]: E0515 10:21:55.293271 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.293447 kubelet[2061]: E0515 10:21:55.293437 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.293486 kubelet[2061]: W0515 10:21:55.293447 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.293486 kubelet[2061]: E0515 10:21:55.293465 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.293712 kubelet[2061]: E0515 10:21:55.293697 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.293748 kubelet[2061]: W0515 10:21:55.293714 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.293777 kubelet[2061]: E0515 10:21:55.293754 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.293979 kubelet[2061]: E0515 10:21:55.293968 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.294010 kubelet[2061]: W0515 10:21:55.293979 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.294010 kubelet[2061]: E0515 10:21:55.293992 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.294216 kubelet[2061]: E0515 10:21:55.294204 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.294216 kubelet[2061]: W0515 10:21:55.294216 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.294384 kubelet[2061]: E0515 10:21:55.294294 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.294384 kubelet[2061]: E0515 10:21:55.294360 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.294384 kubelet[2061]: W0515 10:21:55.294367 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.294384 kubelet[2061]: E0515 10:21:55.294374 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.294517 kubelet[2061]: E0515 10:21:55.294499 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.294517 kubelet[2061]: W0515 10:21:55.294510 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.294589 kubelet[2061]: E0515 10:21:55.294522 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.294662 kubelet[2061]: E0515 10:21:55.294638 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.294662 kubelet[2061]: W0515 10:21:55.294649 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.294662 kubelet[2061]: E0515 10:21:55.294657 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.294821 kubelet[2061]: E0515 10:21:55.294810 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.294821 kubelet[2061]: W0515 10:21:55.294820 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.294890 kubelet[2061]: E0515 10:21:55.294831 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.295172 kubelet[2061]: E0515 10:21:55.295152 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.295226 kubelet[2061]: W0515 10:21:55.295172 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.295226 kubelet[2061]: E0515 10:21:55.295183 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.295363 kubelet[2061]: E0515 10:21:55.295350 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.295363 kubelet[2061]: W0515 10:21:55.295361 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.295431 kubelet[2061]: E0515 10:21:55.295373 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.295541 kubelet[2061]: E0515 10:21:55.295529 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.295541 kubelet[2061]: W0515 10:21:55.295539 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.295610 kubelet[2061]: E0515 10:21:55.295547 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.295692 kubelet[2061]: E0515 10:21:55.295683 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.295692 kubelet[2061]: W0515 10:21:55.295692 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.295765 kubelet[2061]: E0515 10:21:55.295699 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.295861 kubelet[2061]: E0515 10:21:55.295849 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.295861 kubelet[2061]: W0515 10:21:55.295858 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.295930 kubelet[2061]: E0515 10:21:55.295866 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.296364 kubelet[2061]: E0515 10:21:55.296351 2061 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:21:55.296424 kubelet[2061]: W0515 10:21:55.296365 2061 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:21:55.296424 kubelet[2061]: E0515 10:21:55.296376 2061 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:21:55.991137 env[1217]: time="2025-05-15T10:21:55.991095161Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:55.992384 env[1217]: time="2025-05-15T10:21:55.992349266Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:55.993947 env[1217]: time="2025-05-15T10:21:55.993920126Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:55.995367 env[1217]: time="2025-05-15T10:21:55.995341269Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:55.996128 env[1217]: time="2025-05-15T10:21:55.996098059Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8\"" May 15 10:21:56.006598 env[1217]: time="2025-05-15T10:21:56.006169377Z" level=info msg="CreateContainer within sandbox \"4d4619b66d5745784376c715a9b2319fd422604a6eea57d9e54a231d38239a29\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 10:21:56.020121 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3048732337.mount: Deactivated successfully. May 15 10:21:56.024658 env[1217]: time="2025-05-15T10:21:56.024614678Z" level=info msg="CreateContainer within sandbox \"4d4619b66d5745784376c715a9b2319fd422604a6eea57d9e54a231d38239a29\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"5641c7b3188db7c082f678552d06ea1a3940c1513b29b0059b9aaeb29910077c\"" May 15 10:21:56.025465 env[1217]: time="2025-05-15T10:21:56.025436028Z" level=info msg="StartContainer for \"5641c7b3188db7c082f678552d06ea1a3940c1513b29b0059b9aaeb29910077c\"" May 15 10:21:56.058495 systemd[1]: run-containerd-runc-k8s.io-5641c7b3188db7c082f678552d06ea1a3940c1513b29b0059b9aaeb29910077c-runc.KDlqxP.mount: Deactivated successfully. May 15 10:21:56.060403 systemd[1]: Started cri-containerd-5641c7b3188db7c082f678552d06ea1a3940c1513b29b0059b9aaeb29910077c.scope. May 15 10:21:56.092000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2585 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:56.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343163376233313838646237633038326636373835353264303665 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit: BPF prog-id=130 op=LOAD May 15 10:21:56.092000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2585 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:56.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343163376233313838646237633038326636373835353264303665 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit: BPF prog-id=131 op=LOAD May 15 10:21:56.092000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2585 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:56.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343163376233313838646237633038326636373835353264303665 May 15 10:21:56.092000 audit: BPF prog-id=131 op=UNLOAD May 15 10:21:56.092000 audit: BPF prog-id=130 op=UNLOAD May 15 10:21:56.092000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:56.092000 audit: BPF prog-id=132 op=LOAD May 15 10:21:56.092000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2585 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:56.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343163376233313838646237633038326636373835353264303665 May 15 10:21:56.105270 env[1217]: time="2025-05-15T10:21:56.105221682Z" level=info msg="StartContainer for \"5641c7b3188db7c082f678552d06ea1a3940c1513b29b0059b9aaeb29910077c\" returns successfully" May 15 10:21:56.128362 systemd[1]: cri-containerd-5641c7b3188db7c082f678552d06ea1a3940c1513b29b0059b9aaeb29910077c.scope: Deactivated successfully. May 15 10:21:56.132992 kubelet[2061]: E0515 10:21:56.132656 2061 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lh5x" podUID="ef184343-07cc-49e8-9335-04743ecda65a" May 15 10:21:56.135000 audit: BPF prog-id=132 op=UNLOAD May 15 10:21:56.174013 env[1217]: time="2025-05-15T10:21:56.173965146Z" level=info msg="shim disconnected" id=5641c7b3188db7c082f678552d06ea1a3940c1513b29b0059b9aaeb29910077c May 15 10:21:56.174013 env[1217]: time="2025-05-15T10:21:56.174011785Z" level=warning msg="cleaning up after shim disconnected" id=5641c7b3188db7c082f678552d06ea1a3940c1513b29b0059b9aaeb29910077c namespace=k8s.io May 15 10:21:56.174263 env[1217]: time="2025-05-15T10:21:56.174021425Z" level=info msg="cleaning up dead shim" May 15 10:21:56.180793 env[1217]: time="2025-05-15T10:21:56.180742865Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:21:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2738 runtime=io.containerd.runc.v2\n" May 15 10:21:56.199790 kubelet[2061]: I0515 10:21:56.199719 2061 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:21:56.200147 kubelet[2061]: E0515 10:21:56.200045 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:56.200788 kubelet[2061]: E0515 10:21:56.200722 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:21:56.201057 env[1217]: time="2025-05-15T10:21:56.201006545Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 10:21:56.214700 kubelet[2061]: I0515 10:21:56.214628 2061 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6dbbff98d9-mr876" podStartSLOduration=2.486016587 podStartE2EDuration="4.214609703s" podCreationTimestamp="2025-05-15 10:21:52 +0000 UTC" firstStartedPulling="2025-05-15 10:21:53.129693945 +0000 UTC m=+22.095080813" lastFinishedPulling="2025-05-15 10:21:54.858287021 +0000 UTC m=+23.823673929" observedRunningTime="2025-05-15 10:21:55.218792201 +0000 UTC m=+24.184179069" watchObservedRunningTime="2025-05-15 10:21:56.214609703 +0000 UTC m=+25.179996531" May 15 10:21:57.017688 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5641c7b3188db7c082f678552d06ea1a3940c1513b29b0059b9aaeb29910077c-rootfs.mount: Deactivated successfully. May 15 10:21:58.133431 kubelet[2061]: E0515 10:21:58.133374 2061 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lh5x" podUID="ef184343-07cc-49e8-9335-04743ecda65a" May 15 10:21:59.725836 env[1217]: time="2025-05-15T10:21:59.725780931Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:59.727088 env[1217]: time="2025-05-15T10:21:59.727047278Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:59.728619 env[1217]: time="2025-05-15T10:21:59.728586022Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:59.729756 env[1217]: time="2025-05-15T10:21:59.729720650Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:21:59.730227 env[1217]: time="2025-05-15T10:21:59.730196085Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627\"" May 15 10:21:59.733872 env[1217]: time="2025-05-15T10:21:59.733839006Z" level=info msg="CreateContainer within sandbox \"4d4619b66d5745784376c715a9b2319fd422604a6eea57d9e54a231d38239a29\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 10:21:59.747588 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2550085671.mount: Deactivated successfully. May 15 10:21:59.751135 env[1217]: time="2025-05-15T10:21:59.751082825Z" level=info msg="CreateContainer within sandbox \"4d4619b66d5745784376c715a9b2319fd422604a6eea57d9e54a231d38239a29\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"cba581a5244e35314c4398e86dcb68f9d794f668a5ae08922b2d01ab14de1134\"" May 15 10:21:59.753015 env[1217]: time="2025-05-15T10:21:59.751878097Z" level=info msg="StartContainer for \"cba581a5244e35314c4398e86dcb68f9d794f668a5ae08922b2d01ab14de1134\"" May 15 10:21:59.770850 systemd[1]: Started cri-containerd-cba581a5244e35314c4398e86dcb68f9d794f668a5ae08922b2d01ab14de1134.scope. May 15 10:21:59.831332 kernel: kauditd_printk_skb: 223 callbacks suppressed May 15 10:21:59.831462 kernel: audit: type=1400 audit(1747304519.824:1005): avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.831490 kernel: audit: type=1300 audit(1747304519.824:1005): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=2585 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:59.824000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.824000 audit[2765]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=2585 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:59.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362613538316135323434653335333134633433393865383664636236 May 15 10:21:59.836342 kernel: audit: type=1327 audit(1747304519.824:1005): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362613538316135323434653335333134633433393865383664636236 May 15 10:21:59.836409 kernel: audit: type=1400 audit(1747304519.825:1006): avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.841707 kernel: audit: type=1400 audit(1747304519.825:1006): avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.844759 kernel: audit: type=1400 audit(1747304519.825:1006): avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.844833 kernel: audit: type=1400 audit(1747304519.825:1006): avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.847254 kernel: audit: type=1400 audit(1747304519.825:1006): avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.852239 kernel: audit: type=1400 audit(1747304519.825:1006): avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.854881 kernel: audit: type=1400 audit(1747304519.825:1006): avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit: BPF prog-id=133 op=LOAD May 15 10:21:59.825000 audit[2765]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=2585 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:59.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362613538316135323434653335333134633433393865383664636236 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.825000 audit: BPF prog-id=134 op=LOAD May 15 10:21:59.825000 audit[2765]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=2585 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:59.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362613538316135323434653335333134633433393865383664636236 May 15 10:21:59.828000 audit: BPF prog-id=134 op=UNLOAD May 15 10:21:59.828000 audit: BPF prog-id=133 op=UNLOAD May 15 10:21:59.828000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.828000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.828000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.828000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.828000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.828000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.828000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.828000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.828000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.828000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:59.828000 audit: BPF prog-id=135 op=LOAD May 15 10:21:59.828000 audit[2765]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=2585 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:59.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362613538316135323434653335333134633433393865383664636236 May 15 10:21:59.912698 env[1217]: time="2025-05-15T10:21:59.912647565Z" level=info msg="StartContainer for \"cba581a5244e35314c4398e86dcb68f9d794f668a5ae08922b2d01ab14de1134\" returns successfully" May 15 10:22:00.132674 kubelet[2061]: E0515 10:22:00.132607 2061 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2lh5x" podUID="ef184343-07cc-49e8-9335-04743ecda65a" May 15 10:22:00.207631 kubelet[2061]: E0515 10:22:00.207314 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:00.457238 env[1217]: time="2025-05-15T10:22:00.457115056Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:22:00.464060 systemd[1]: cri-containerd-cba581a5244e35314c4398e86dcb68f9d794f668a5ae08922b2d01ab14de1134.scope: Deactivated successfully. May 15 10:22:00.470000 audit: BPF prog-id=135 op=UNLOAD May 15 10:22:00.474556 kubelet[2061]: I0515 10:22:00.474528 2061 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 15 10:22:00.495484 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cba581a5244e35314c4398e86dcb68f9d794f668a5ae08922b2d01ab14de1134-rootfs.mount: Deactivated successfully. May 15 10:22:00.513886 kubelet[2061]: I0515 10:22:00.513287 2061 topology_manager.go:215] "Topology Admit Handler" podUID="7053c2cf-5dbb-4d82-8c91-e2174a115431" podNamespace="kube-system" podName="coredns-7db6d8ff4d-tvb89" May 15 10:22:00.518517 systemd[1]: Created slice kubepods-burstable-pod7053c2cf_5dbb_4d82_8c91_e2174a115431.slice. May 15 10:22:00.525008 kubelet[2061]: I0515 10:22:00.524743 2061 topology_manager.go:215] "Topology Admit Handler" podUID="53220aaf-f836-49cd-aefa-94243d2976b9" podNamespace="calico-system" podName="calico-kube-controllers-74bdffb748-sc7rm" May 15 10:22:00.525935 kubelet[2061]: I0515 10:22:00.525910 2061 topology_manager.go:215] "Topology Admit Handler" podUID="a8c1e0fc-e162-4660-8541-ae03de4774d5" podNamespace="calico-apiserver" podName="calico-apiserver-5c4847f848-zht7m" May 15 10:22:00.526197 kubelet[2061]: I0515 10:22:00.526171 2061 topology_manager.go:215] "Topology Admit Handler" podUID="b79ed0d1-14ce-496a-97e8-22f5c01122ae" podNamespace="calico-apiserver" podName="calico-apiserver-5c4847f848-xb28g" May 15 10:22:00.528701 kubelet[2061]: I0515 10:22:00.528181 2061 topology_manager.go:215] "Topology Admit Handler" podUID="0f11ae80-4684-4751-8047-b43bdb1f9716" podNamespace="kube-system" podName="coredns-7db6d8ff4d-59vhs" May 15 10:22:00.530412 systemd[1]: Created slice kubepods-besteffort-pod53220aaf_f836_49cd_aefa_94243d2976b9.slice. May 15 10:22:00.535429 systemd[1]: Created slice kubepods-besteffort-poda8c1e0fc_e162_4660_8541_ae03de4774d5.slice. May 15 10:22:00.540636 systemd[1]: Created slice kubepods-besteffort-podb79ed0d1_14ce_496a_97e8_22f5c01122ae.slice. May 15 10:22:00.544837 systemd[1]: Created slice kubepods-burstable-pod0f11ae80_4684_4751_8047_b43bdb1f9716.slice. May 15 10:22:00.556991 env[1217]: time="2025-05-15T10:22:00.553982195Z" level=info msg="shim disconnected" id=cba581a5244e35314c4398e86dcb68f9d794f668a5ae08922b2d01ab14de1134 May 15 10:22:00.556991 env[1217]: time="2025-05-15T10:22:00.554029794Z" level=warning msg="cleaning up after shim disconnected" id=cba581a5244e35314c4398e86dcb68f9d794f668a5ae08922b2d01ab14de1134 namespace=k8s.io May 15 10:22:00.556991 env[1217]: time="2025-05-15T10:22:00.554042954Z" level=info msg="cleaning up dead shim" May 15 10:22:00.565379 env[1217]: time="2025-05-15T10:22:00.565290160Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:22:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2807 runtime=io.containerd.runc.v2\n" May 15 10:22:00.573789 kubelet[2061]: I0515 10:22:00.573735 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/53220aaf-f836-49cd-aefa-94243d2976b9-tigera-ca-bundle\") pod \"calico-kube-controllers-74bdffb748-sc7rm\" (UID: \"53220aaf-f836-49cd-aefa-94243d2976b9\") " pod="calico-system/calico-kube-controllers-74bdffb748-sc7rm" May 15 10:22:00.573789 kubelet[2061]: I0515 10:22:00.573787 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a8c1e0fc-e162-4660-8541-ae03de4774d5-calico-apiserver-certs\") pod \"calico-apiserver-5c4847f848-zht7m\" (UID: \"a8c1e0fc-e162-4660-8541-ae03de4774d5\") " pod="calico-apiserver/calico-apiserver-5c4847f848-zht7m" May 15 10:22:00.573986 kubelet[2061]: I0515 10:22:00.573811 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/7053c2cf-5dbb-4d82-8c91-e2174a115431-config-volume\") pod \"coredns-7db6d8ff4d-tvb89\" (UID: \"7053c2cf-5dbb-4d82-8c91-e2174a115431\") " pod="kube-system/coredns-7db6d8ff4d-tvb89" May 15 10:22:00.573986 kubelet[2061]: I0515 10:22:00.573831 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xwxtm\" (UniqueName: \"kubernetes.io/projected/a8c1e0fc-e162-4660-8541-ae03de4774d5-kube-api-access-xwxtm\") pod \"calico-apiserver-5c4847f848-zht7m\" (UID: \"a8c1e0fc-e162-4660-8541-ae03de4774d5\") " pod="calico-apiserver/calico-apiserver-5c4847f848-zht7m" May 15 10:22:00.573986 kubelet[2061]: I0515 10:22:00.573851 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b79ed0d1-14ce-496a-97e8-22f5c01122ae-calico-apiserver-certs\") pod \"calico-apiserver-5c4847f848-xb28g\" (UID: \"b79ed0d1-14ce-496a-97e8-22f5c01122ae\") " pod="calico-apiserver/calico-apiserver-5c4847f848-xb28g" May 15 10:22:00.573986 kubelet[2061]: I0515 10:22:00.573869 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zrlck\" (UniqueName: \"kubernetes.io/projected/53220aaf-f836-49cd-aefa-94243d2976b9-kube-api-access-zrlck\") pod \"calico-kube-controllers-74bdffb748-sc7rm\" (UID: \"53220aaf-f836-49cd-aefa-94243d2976b9\") " pod="calico-system/calico-kube-controllers-74bdffb748-sc7rm" May 15 10:22:00.573986 kubelet[2061]: I0515 10:22:00.573891 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mq5ms\" (UniqueName: \"kubernetes.io/projected/7053c2cf-5dbb-4d82-8c91-e2174a115431-kube-api-access-mq5ms\") pod \"coredns-7db6d8ff4d-tvb89\" (UID: \"7053c2cf-5dbb-4d82-8c91-e2174a115431\") " pod="kube-system/coredns-7db6d8ff4d-tvb89" May 15 10:22:00.574129 kubelet[2061]: I0515 10:22:00.573908 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zm57s\" (UniqueName: \"kubernetes.io/projected/b79ed0d1-14ce-496a-97e8-22f5c01122ae-kube-api-access-zm57s\") pod \"calico-apiserver-5c4847f848-xb28g\" (UID: \"b79ed0d1-14ce-496a-97e8-22f5c01122ae\") " pod="calico-apiserver/calico-apiserver-5c4847f848-xb28g" May 15 10:22:00.675264 kubelet[2061]: I0515 10:22:00.675219 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ql4w5\" (UniqueName: \"kubernetes.io/projected/0f11ae80-4684-4751-8047-b43bdb1f9716-kube-api-access-ql4w5\") pod \"coredns-7db6d8ff4d-59vhs\" (UID: \"0f11ae80-4684-4751-8047-b43bdb1f9716\") " pod="kube-system/coredns-7db6d8ff4d-59vhs" May 15 10:22:00.675533 kubelet[2061]: I0515 10:22:00.675511 2061 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/0f11ae80-4684-4751-8047-b43bdb1f9716-config-volume\") pod \"coredns-7db6d8ff4d-59vhs\" (UID: \"0f11ae80-4684-4751-8047-b43bdb1f9716\") " pod="kube-system/coredns-7db6d8ff4d-59vhs" May 15 10:22:00.821250 kubelet[2061]: E0515 10:22:00.821200 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:00.821905 env[1217]: time="2025-05-15T10:22:00.821859242Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-tvb89,Uid:7053c2cf-5dbb-4d82-8c91-e2174a115431,Namespace:kube-system,Attempt:0,}" May 15 10:22:00.833780 env[1217]: time="2025-05-15T10:22:00.833728362Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74bdffb748-sc7rm,Uid:53220aaf-f836-49cd-aefa-94243d2976b9,Namespace:calico-system,Attempt:0,}" May 15 10:22:00.839152 env[1217]: time="2025-05-15T10:22:00.838913149Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c4847f848-zht7m,Uid:a8c1e0fc-e162-4660-8541-ae03de4774d5,Namespace:calico-apiserver,Attempt:0,}" May 15 10:22:00.847994 kubelet[2061]: E0515 10:22:00.847946 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:00.848542 env[1217]: time="2025-05-15T10:22:00.848327454Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c4847f848-xb28g,Uid:b79ed0d1-14ce-496a-97e8-22f5c01122ae,Namespace:calico-apiserver,Attempt:0,}" May 15 10:22:00.848542 env[1217]: time="2025-05-15T10:22:00.848417013Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-59vhs,Uid:0f11ae80-4684-4751-8047-b43bdb1f9716,Namespace:kube-system,Attempt:0,}" May 15 10:22:01.096405 systemd[1]: Started sshd@7-10.0.0.103:22-10.0.0.1:40332.service. May 15 10:22:01.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.103:22-10.0.0.1:40332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:01.153000 audit[2889]: USER_ACCT pid=2889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:01.155290 sshd[2889]: Accepted publickey for core from 10.0.0.1 port 40332 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:22:01.155000 audit[2889]: CRED_ACQ pid=2889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:01.155000 audit[2889]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffce0590e0 a2=3 a3=1 items=0 ppid=1 pid=2889 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:01.155000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:22:01.157513 sshd[2889]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:22:01.162981 systemd[1]: Started session-8.scope. May 15 10:22:01.163802 systemd-logind[1203]: New session 8 of user core. May 15 10:22:01.178000 audit[2889]: USER_START pid=2889 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:01.180000 audit[2938]: CRED_ACQ pid=2938 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:01.214252 kubelet[2061]: E0515 10:22:01.214215 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:01.243693 env[1217]: time="2025-05-15T10:22:01.243641258Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 10:22:01.268880 env[1217]: time="2025-05-15T10:22:01.268802773Z" level=error msg="Failed to destroy network for sandbox \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.271662 env[1217]: time="2025-05-15T10:22:01.271202749Z" level=error msg="encountered an error cleaning up failed sandbox \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.271662 env[1217]: time="2025-05-15T10:22:01.271270749Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74bdffb748-sc7rm,Uid:53220aaf-f836-49cd-aefa-94243d2976b9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.271888 kubelet[2061]: E0515 10:22:01.271496 2061 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.271888 kubelet[2061]: E0515 10:22:01.271576 2061 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74bdffb748-sc7rm" May 15 10:22:01.272029 kubelet[2061]: E0515 10:22:01.271989 2061 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74bdffb748-sc7rm" May 15 10:22:01.272096 kubelet[2061]: E0515 10:22:01.272059 2061 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-74bdffb748-sc7rm_calico-system(53220aaf-f836-49cd-aefa-94243d2976b9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-74bdffb748-sc7rm_calico-system(53220aaf-f836-49cd-aefa-94243d2976b9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74bdffb748-sc7rm" podUID="53220aaf-f836-49cd-aefa-94243d2976b9" May 15 10:22:01.272455 env[1217]: time="2025-05-15T10:22:01.272387138Z" level=error msg="Failed to destroy network for sandbox \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.272654 env[1217]: time="2025-05-15T10:22:01.272619376Z" level=error msg="Failed to destroy network for sandbox \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.272771 env[1217]: time="2025-05-15T10:22:01.272724455Z" level=error msg="encountered an error cleaning up failed sandbox \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.272850 env[1217]: time="2025-05-15T10:22:01.272779774Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c4847f848-zht7m,Uid:a8c1e0fc-e162-4660-8541-ae03de4774d5,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.273227 env[1217]: time="2025-05-15T10:22:01.273135571Z" level=error msg="encountered an error cleaning up failed sandbox \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.273373 kubelet[2061]: E0515 10:22:01.273302 2061 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.273373 kubelet[2061]: E0515 10:22:01.273357 2061 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5c4847f848-zht7m" May 15 10:22:01.273463 kubelet[2061]: E0515 10:22:01.273377 2061 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5c4847f848-zht7m" May 15 10:22:01.273463 kubelet[2061]: E0515 10:22:01.273415 2061 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5c4847f848-zht7m_calico-apiserver(a8c1e0fc-e162-4660-8541-ae03de4774d5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5c4847f848-zht7m_calico-apiserver(a8c1e0fc-e162-4660-8541-ae03de4774d5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5c4847f848-zht7m" podUID="a8c1e0fc-e162-4660-8541-ae03de4774d5" May 15 10:22:01.273607 env[1217]: time="2025-05-15T10:22:01.273315049Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-59vhs,Uid:0f11ae80-4684-4751-8047-b43bdb1f9716,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.273814 kubelet[2061]: E0515 10:22:01.273758 2061 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.273814 kubelet[2061]: E0515 10:22:01.273787 2061 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-59vhs" May 15 10:22:01.273814 kubelet[2061]: E0515 10:22:01.273804 2061 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-59vhs" May 15 10:22:01.274115 kubelet[2061]: E0515 10:22:01.273837 2061 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-59vhs_kube-system(0f11ae80-4684-4751-8047-b43bdb1f9716)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-59vhs_kube-system(0f11ae80-4684-4751-8047-b43bdb1f9716)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-59vhs" podUID="0f11ae80-4684-4751-8047-b43bdb1f9716" May 15 10:22:01.283927 env[1217]: time="2025-05-15T10:22:01.283863266Z" level=error msg="Failed to destroy network for sandbox \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.284774 env[1217]: time="2025-05-15T10:22:01.284732137Z" level=error msg="encountered an error cleaning up failed sandbox \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.284952 env[1217]: time="2025-05-15T10:22:01.284921496Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c4847f848-xb28g,Uid:b79ed0d1-14ce-496a-97e8-22f5c01122ae,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.285319 kubelet[2061]: E0515 10:22:01.285277 2061 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.285412 kubelet[2061]: E0515 10:22:01.285340 2061 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5c4847f848-xb28g" May 15 10:22:01.285412 kubelet[2061]: E0515 10:22:01.285362 2061 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5c4847f848-xb28g" May 15 10:22:01.285481 kubelet[2061]: E0515 10:22:01.285399 2061 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5c4847f848-xb28g_calico-apiserver(b79ed0d1-14ce-496a-97e8-22f5c01122ae)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5c4847f848-xb28g_calico-apiserver(b79ed0d1-14ce-496a-97e8-22f5c01122ae)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5c4847f848-xb28g" podUID="b79ed0d1-14ce-496a-97e8-22f5c01122ae" May 15 10:22:01.292826 env[1217]: time="2025-05-15T10:22:01.292778939Z" level=error msg="Failed to destroy network for sandbox \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.293345 env[1217]: time="2025-05-15T10:22:01.293307134Z" level=error msg="encountered an error cleaning up failed sandbox \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.293482 env[1217]: time="2025-05-15T10:22:01.293453012Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-tvb89,Uid:7053c2cf-5dbb-4d82-8c91-e2174a115431,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.293729 kubelet[2061]: E0515 10:22:01.293694 2061 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:01.293798 kubelet[2061]: E0515 10:22:01.293751 2061 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-tvb89" May 15 10:22:01.293798 kubelet[2061]: E0515 10:22:01.293775 2061 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-tvb89" May 15 10:22:01.293961 kubelet[2061]: E0515 10:22:01.293808 2061 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-tvb89_kube-system(7053c2cf-5dbb-4d82-8c91-e2174a115431)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-tvb89_kube-system(7053c2cf-5dbb-4d82-8c91-e2174a115431)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-tvb89" podUID="7053c2cf-5dbb-4d82-8c91-e2174a115431" May 15 10:22:01.334939 sshd[2889]: pam_unix(sshd:session): session closed for user core May 15 10:22:01.334000 audit[2889]: USER_END pid=2889 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:01.334000 audit[2889]: CRED_DISP pid=2889 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:01.337573 systemd-logind[1203]: Session 8 logged out. Waiting for processes to exit. May 15 10:22:01.337807 systemd[1]: sshd@7-10.0.0.103:22-10.0.0.1:40332.service: Deactivated successfully. May 15 10:22:01.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.103:22-10.0.0.1:40332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:01.338544 systemd[1]: session-8.scope: Deactivated successfully. May 15 10:22:01.339141 systemd-logind[1203]: Removed session 8. May 15 10:22:01.745654 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f-shm.mount: Deactivated successfully. May 15 10:22:01.745736 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b-shm.mount: Deactivated successfully. May 15 10:22:02.137849 systemd[1]: Created slice kubepods-besteffort-podef184343_07cc_49e8_9335_04743ecda65a.slice. May 15 10:22:02.139912 env[1217]: time="2025-05-15T10:22:02.139872281Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2lh5x,Uid:ef184343-07cc-49e8-9335-04743ecda65a,Namespace:calico-system,Attempt:0,}" May 15 10:22:02.193547 env[1217]: time="2025-05-15T10:22:02.193483776Z" level=error msg="Failed to destroy network for sandbox \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:02.195457 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5-shm.mount: Deactivated successfully. May 15 10:22:02.196419 env[1217]: time="2025-05-15T10:22:02.196380709Z" level=error msg="encountered an error cleaning up failed sandbox \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:02.196474 env[1217]: time="2025-05-15T10:22:02.196440188Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2lh5x,Uid:ef184343-07cc-49e8-9335-04743ecda65a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:02.197116 kubelet[2061]: E0515 10:22:02.196679 2061 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:02.197116 kubelet[2061]: E0515 10:22:02.196741 2061 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2lh5x" May 15 10:22:02.197116 kubelet[2061]: E0515 10:22:02.196774 2061 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2lh5x" May 15 10:22:02.197346 kubelet[2061]: E0515 10:22:02.196821 2061 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-2lh5x_calico-system(ef184343-07cc-49e8-9335-04743ecda65a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-2lh5x_calico-system(ef184343-07cc-49e8-9335-04743ecda65a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lh5x" podUID="ef184343-07cc-49e8-9335-04743ecda65a" May 15 10:22:02.217302 kubelet[2061]: I0515 10:22:02.217245 2061 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" May 15 10:22:02.218963 kubelet[2061]: I0515 10:22:02.218660 2061 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" May 15 10:22:02.220222 kubelet[2061]: I0515 10:22:02.220190 2061 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" May 15 10:22:02.222103 kubelet[2061]: I0515 10:22:02.222078 2061 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" May 15 10:22:02.223139 kubelet[2061]: I0515 10:22:02.223113 2061 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" May 15 10:22:02.224088 kubelet[2061]: I0515 10:22:02.224066 2061 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" May 15 10:22:02.226385 env[1217]: time="2025-05-15T10:22:02.226347947Z" level=info msg="StopPodSandbox for \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\"" May 15 10:22:02.226574 env[1217]: time="2025-05-15T10:22:02.226549825Z" level=info msg="StopPodSandbox for \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\"" May 15 10:22:02.227311 env[1217]: time="2025-05-15T10:22:02.227283258Z" level=info msg="StopPodSandbox for \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\"" May 15 10:22:02.227505 env[1217]: time="2025-05-15T10:22:02.226355907Z" level=info msg="StopPodSandbox for \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\"" May 15 10:22:02.228103 env[1217]: time="2025-05-15T10:22:02.227497776Z" level=info msg="StopPodSandbox for \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\"" May 15 10:22:02.228223 env[1217]: time="2025-05-15T10:22:02.227453936Z" level=info msg="StopPodSandbox for \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\"" May 15 10:22:02.265404 env[1217]: time="2025-05-15T10:22:02.265340540Z" level=error msg="StopPodSandbox for \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\" failed" error="failed to destroy network for sandbox \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:02.266322 kubelet[2061]: E0515 10:22:02.266268 2061 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" May 15 10:22:02.266422 kubelet[2061]: E0515 10:22:02.266348 2061 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f"} May 15 10:22:02.266422 kubelet[2061]: E0515 10:22:02.266406 2061 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"53220aaf-f836-49cd-aefa-94243d2976b9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:22:02.266508 kubelet[2061]: E0515 10:22:02.266429 2061 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"53220aaf-f836-49cd-aefa-94243d2976b9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74bdffb748-sc7rm" podUID="53220aaf-f836-49cd-aefa-94243d2976b9" May 15 10:22:02.267503 env[1217]: time="2025-05-15T10:22:02.267450800Z" level=error msg="StopPodSandbox for \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\" failed" error="failed to destroy network for sandbox \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:02.267650 kubelet[2061]: E0515 10:22:02.267617 2061 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" May 15 10:22:02.267705 kubelet[2061]: E0515 10:22:02.267673 2061 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc"} May 15 10:22:02.267705 kubelet[2061]: E0515 10:22:02.267697 2061 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a8c1e0fc-e162-4660-8541-ae03de4774d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:22:02.267785 kubelet[2061]: E0515 10:22:02.267714 2061 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a8c1e0fc-e162-4660-8541-ae03de4774d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5c4847f848-zht7m" podUID="a8c1e0fc-e162-4660-8541-ae03de4774d5" May 15 10:22:02.268567 env[1217]: time="2025-05-15T10:22:02.268527590Z" level=error msg="StopPodSandbox for \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\" failed" error="failed to destroy network for sandbox \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:02.268694 kubelet[2061]: E0515 10:22:02.268660 2061 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" May 15 10:22:02.268748 kubelet[2061]: E0515 10:22:02.268695 2061 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5"} May 15 10:22:02.268748 kubelet[2061]: E0515 10:22:02.268717 2061 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ef184343-07cc-49e8-9335-04743ecda65a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:22:02.268748 kubelet[2061]: E0515 10:22:02.268734 2061 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ef184343-07cc-49e8-9335-04743ecda65a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2lh5x" podUID="ef184343-07cc-49e8-9335-04743ecda65a" May 15 10:22:02.277818 env[1217]: time="2025-05-15T10:22:02.277775263Z" level=error msg="StopPodSandbox for \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\" failed" error="failed to destroy network for sandbox \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:02.277990 kubelet[2061]: E0515 10:22:02.277960 2061 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" May 15 10:22:02.278048 kubelet[2061]: E0515 10:22:02.277996 2061 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c"} May 15 10:22:02.278048 kubelet[2061]: E0515 10:22:02.278021 2061 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0f11ae80-4684-4751-8047-b43bdb1f9716\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:22:02.278048 kubelet[2061]: E0515 10:22:02.278038 2061 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0f11ae80-4684-4751-8047-b43bdb1f9716\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-59vhs" podUID="0f11ae80-4684-4751-8047-b43bdb1f9716" May 15 10:22:02.278935 env[1217]: time="2025-05-15T10:22:02.278895492Z" level=error msg="StopPodSandbox for \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\" failed" error="failed to destroy network for sandbox \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:02.279142 kubelet[2061]: E0515 10:22:02.279110 2061 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" May 15 10:22:02.279221 kubelet[2061]: E0515 10:22:02.279147 2061 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809"} May 15 10:22:02.279221 kubelet[2061]: E0515 10:22:02.279184 2061 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b79ed0d1-14ce-496a-97e8-22f5c01122ae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:22:02.279221 kubelet[2061]: E0515 10:22:02.279203 2061 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b79ed0d1-14ce-496a-97e8-22f5c01122ae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5c4847f848-xb28g" podUID="b79ed0d1-14ce-496a-97e8-22f5c01122ae" May 15 10:22:02.288646 env[1217]: time="2025-05-15T10:22:02.288594881Z" level=error msg="StopPodSandbox for \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\" failed" error="failed to destroy network for sandbox \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:02.288818 kubelet[2061]: E0515 10:22:02.288781 2061 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" May 15 10:22:02.288865 kubelet[2061]: E0515 10:22:02.288820 2061 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b"} May 15 10:22:02.288865 kubelet[2061]: E0515 10:22:02.288846 2061 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7053c2cf-5dbb-4d82-8c91-e2174a115431\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:22:02.288927 kubelet[2061]: E0515 10:22:02.288863 2061 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7053c2cf-5dbb-4d82-8c91-e2174a115431\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-tvb89" podUID="7053c2cf-5dbb-4d82-8c91-e2174a115431" May 15 10:22:06.338181 systemd[1]: Started sshd@8-10.0.0.103:22-10.0.0.1:47878.service. May 15 10:22:06.342860 kernel: kauditd_printk_skb: 45 callbacks suppressed May 15 10:22:06.342957 kernel: audit: type=1130 audit(1747304526.337:1021): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.103:22-10.0.0.1:47878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:06.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.103:22-10.0.0.1:47878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:06.419000 audit[3213]: USER_ACCT pid=3213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:06.424527 sshd[3213]: Accepted publickey for core from 10.0.0.1 port 47878 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:22:06.425192 kernel: audit: type=1101 audit(1747304526.419:1022): pid=3213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:06.434791 kernel: audit: type=1103 audit(1747304526.424:1023): pid=3213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:06.434875 kernel: audit: type=1006 audit(1747304526.424:1024): pid=3213 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 15 10:22:06.434897 kernel: audit: type=1300 audit(1747304526.424:1024): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcf5f4bf0 a2=3 a3=1 items=0 ppid=1 pid=3213 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:06.434916 kernel: audit: type=1327 audit(1747304526.424:1024): proctitle=737368643A20636F7265205B707269765D May 15 10:22:06.424000 audit[3213]: CRED_ACQ pid=3213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:06.424000 audit[3213]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcf5f4bf0 a2=3 a3=1 items=0 ppid=1 pid=3213 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:06.424000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:22:06.426480 sshd[3213]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:22:06.437257 systemd-logind[1203]: New session 9 of user core. May 15 10:22:06.438081 systemd[1]: Started session-9.scope. May 15 10:22:06.440000 audit[3213]: USER_START pid=3213 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:06.448458 kernel: audit: type=1105 audit(1747304526.440:1025): pid=3213 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:06.448526 kernel: audit: type=1103 audit(1747304526.444:1026): pid=3215 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:06.444000 audit[3215]: CRED_ACQ pid=3215 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:06.523369 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1108915728.mount: Deactivated successfully. May 15 10:22:06.872677 env[1217]: time="2025-05-15T10:22:06.872628591Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:06.874253 env[1217]: time="2025-05-15T10:22:06.874221058Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:06.875715 env[1217]: time="2025-05-15T10:22:06.875678966Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:06.877167 env[1217]: time="2025-05-15T10:22:06.877127634Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:06.877565 env[1217]: time="2025-05-15T10:22:06.877538671Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057\"" May 15 10:22:06.889533 env[1217]: time="2025-05-15T10:22:06.889500933Z" level=info msg="CreateContainer within sandbox \"4d4619b66d5745784376c715a9b2319fd422604a6eea57d9e54a231d38239a29\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 10:22:06.913797 sshd[3213]: pam_unix(sshd:session): session closed for user core May 15 10:22:06.921250 kernel: audit: type=1106 audit(1747304526.913:1027): pid=3213 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:06.921350 kernel: audit: type=1104 audit(1747304526.913:1028): pid=3213 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:06.913000 audit[3213]: USER_END pid=3213 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:06.913000 audit[3213]: CRED_DISP pid=3213 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:06.921491 env[1217]: time="2025-05-15T10:22:06.915855396Z" level=info msg="CreateContainer within sandbox \"4d4619b66d5745784376c715a9b2319fd422604a6eea57d9e54a231d38239a29\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4fd0ab99592fc9c300038be7a99dac91b0791a28c533f3c5b1996fdafbe79e60\"" May 15 10:22:06.921491 env[1217]: time="2025-05-15T10:22:06.916613229Z" level=info msg="StartContainer for \"4fd0ab99592fc9c300038be7a99dac91b0791a28c533f3c5b1996fdafbe79e60\"" May 15 10:22:06.919659 systemd[1]: sshd@8-10.0.0.103:22-10.0.0.1:47878.service: Deactivated successfully. May 15 10:22:06.920734 systemd[1]: session-9.scope: Deactivated successfully. May 15 10:22:06.921581 systemd-logind[1203]: Session 9 logged out. Waiting for processes to exit. May 15 10:22:06.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.103:22-10.0.0.1:47878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:06.922596 systemd-logind[1203]: Removed session 9. May 15 10:22:06.933040 systemd[1]: Started cri-containerd-4fd0ab99592fc9c300038be7a99dac91b0791a28c533f3c5b1996fdafbe79e60.scope. May 15 10:22:06.966000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2585 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:06.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466643061623939353932666339633330303033386265376139396461 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit: BPF prog-id=136 op=LOAD May 15 10:22:06.966000 audit[3236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2585 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:06.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466643061623939353932666339633330303033386265376139396461 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit: BPF prog-id=137 op=LOAD May 15 10:22:06.966000 audit[3236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2585 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:06.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466643061623939353932666339633330303033386265376139396461 May 15 10:22:06.966000 audit: BPF prog-id=137 op=UNLOAD May 15 10:22:06.966000 audit: BPF prog-id=136 op=UNLOAD May 15 10:22:06.966000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:06.966000 audit: BPF prog-id=138 op=LOAD May 15 10:22:06.966000 audit[3236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2585 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:06.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466643061623939353932666339633330303033386265376139396461 May 15 10:22:06.986996 env[1217]: time="2025-05-15T10:22:06.986937971Z" level=info msg="StartContainer for \"4fd0ab99592fc9c300038be7a99dac91b0791a28c533f3c5b1996fdafbe79e60\" returns successfully" May 15 10:22:07.143532 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 10:22:07.143701 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 10:22:07.234206 kubelet[2061]: E0515 10:22:07.234144 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:08.235222 kubelet[2061]: I0515 10:22:08.235156 2061 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:22:08.235935 kubelet[2061]: E0515 10:22:08.235898 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:08.422000 audit[3350]: AVC avc: denied { write } for pid=3350 comm="tee" name="fd" dev="proc" ino=19203 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:22:08.422000 audit[3350]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd88c8a2e a2=241 a3=1b6 items=1 ppid=3305 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:08.422000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 10:22:08.423000 audit[3340]: AVC avc: denied { write } for pid=3340 comm="tee" name="fd" dev="proc" ino=18111 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:22:08.423000 audit[3340]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd691ea2e a2=241 a3=1b6 items=1 ppid=3303 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:08.423000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 10:22:08.423000 audit: PATH item=0 name="/dev/fd/63" inode=19194 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:08.423000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:22:08.422000 audit: PATH item=0 name="/dev/fd/63" inode=19600 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:08.422000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:22:08.428000 audit[3374]: AVC avc: denied { write } for pid=3374 comm="tee" name="fd" dev="proc" ino=20645 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:22:08.428000 audit[3374]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeb1e4a1e a2=241 a3=1b6 items=1 ppid=3322 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:08.428000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 10:22:08.428000 audit: PATH item=0 name="/dev/fd/63" inode=18118 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:08.428000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:22:08.434000 audit[3368]: AVC avc: denied { write } for pid=3368 comm="tee" name="fd" dev="proc" ino=18124 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:22:08.434000 audit[3368]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff090da2f a2=241 a3=1b6 items=1 ppid=3310 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:08.434000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 10:22:08.434000 audit: PATH item=0 name="/dev/fd/63" inode=18115 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:08.434000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:22:08.434000 audit[3371]: AVC avc: denied { write } for pid=3371 comm="tee" name="fd" dev="proc" ino=19609 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:22:08.434000 audit[3371]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd43eaa30 a2=241 a3=1b6 items=1 ppid=3302 pid=3371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:08.434000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 10:22:08.434000 audit: PATH item=0 name="/dev/fd/63" inode=19606 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:08.434000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:22:08.435000 audit[3367]: AVC avc: denied { write } for pid=3367 comm="tee" name="fd" dev="proc" ino=18128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:22:08.435000 audit[3367]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffb3eda1f a2=241 a3=1b6 items=1 ppid=3314 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:08.435000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 10:22:08.435000 audit: PATH item=0 name="/dev/fd/63" inode=19605 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:08.435000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:22:08.440000 audit[3378]: AVC avc: denied { write } for pid=3378 comm="tee" name="fd" dev="proc" ino=19613 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:22:08.440000 audit[3378]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffa4e1a2e a2=241 a3=1b6 items=1 ppid=3304 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:08.440000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 10:22:08.440000 audit: PATH item=0 name="/dev/fd/63" inode=18121 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:08.440000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:22:11.918186 systemd[1]: Started sshd@9-10.0.0.103:22-10.0.0.1:47892.service. May 15 10:22:11.919397 kubelet[2061]: I0515 10:22:11.919370 2061 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:22:11.920440 kubelet[2061]: E0515 10:22:11.920418 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:11.923781 kernel: kauditd_printk_skb: 79 callbacks suppressed May 15 10:22:11.923862 kernel: audit: type=1130 audit(1747304531.917:1043): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.103:22-10.0.0.1:47892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:11.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.103:22-10.0.0.1:47892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:11.946869 systemd[1]: run-containerd-runc-k8s.io-4fd0ab99592fc9c300038be7a99dac91b0791a28c533f3c5b1996fdafbe79e60-runc.2xEmau.mount: Deactivated successfully. May 15 10:22:11.990000 audit[3467]: USER_ACCT pid=3467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:11.991225 sshd[3467]: Accepted publickey for core from 10.0.0.1 port 47892 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:22:11.997342 kernel: audit: type=1101 audit(1747304531.990:1044): pid=3467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:11.996000 audit[3467]: CRED_ACQ pid=3467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:11.999871 sshd[3467]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:22:12.004372 kernel: audit: type=1103 audit(1747304531.996:1045): pid=3467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.004449 kernel: audit: type=1006 audit(1747304531.996:1046): pid=3467 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 15 10:22:11.996000 audit[3467]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc43bed40 a2=3 a3=1 items=0 ppid=1 pid=3467 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:12.008349 kernel: audit: type=1300 audit(1747304531.996:1046): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc43bed40 a2=3 a3=1 items=0 ppid=1 pid=3467 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:12.008437 kernel: audit: type=1327 audit(1747304531.996:1046): proctitle=737368643A20636F7265205B707269765D May 15 10:22:11.996000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:22:12.014306 systemd-logind[1203]: New session 10 of user core. May 15 10:22:12.014560 systemd[1]: Started session-10.scope. May 15 10:22:12.024000 audit[3467]: USER_START pid=3467 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.031388 kernel: audit: type=1105 audit(1747304532.024:1047): pid=3467 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.031472 kernel: audit: type=1103 audit(1747304532.029:1048): pid=3487 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.029000 audit[3487]: CRED_ACQ pid=3487 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.086020 systemd[1]: run-containerd-runc-k8s.io-4fd0ab99592fc9c300038be7a99dac91b0791a28c533f3c5b1996fdafbe79e60-runc.yiACKx.mount: Deactivated successfully. May 15 10:22:12.172750 sshd[3467]: pam_unix(sshd:session): session closed for user core May 15 10:22:12.173000 audit[3467]: USER_END pid=3467 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.176950 systemd[1]: Started sshd@10-10.0.0.103:22-10.0.0.1:47904.service. May 15 10:22:12.173000 audit[3467]: CRED_DISP pid=3467 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.179650 systemd[1]: sshd@9-10.0.0.103:22-10.0.0.1:47892.service: Deactivated successfully. May 15 10:22:12.180502 systemd[1]: session-10.scope: Deactivated successfully. May 15 10:22:12.181764 kernel: audit: type=1106 audit(1747304532.173:1049): pid=3467 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.181825 kernel: audit: type=1104 audit(1747304532.173:1050): pid=3467 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.103:22-10.0.0.1:47904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:12.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.103:22-10.0.0.1:47892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:12.183624 systemd-logind[1203]: Session 10 logged out. Waiting for processes to exit. May 15 10:22:12.184670 systemd-logind[1203]: Removed session 10. May 15 10:22:12.214000 audit[3528]: USER_ACCT pid=3528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.215552 sshd[3528]: Accepted publickey for core from 10.0.0.1 port 47904 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:22:12.215000 audit[3528]: CRED_ACQ pid=3528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.215000 audit[3528]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc2d45f90 a2=3 a3=1 items=0 ppid=1 pid=3528 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:12.215000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:22:12.216627 sshd[3528]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:22:12.219940 systemd-logind[1203]: New session 11 of user core. May 15 10:22:12.220812 systemd[1]: Started session-11.scope. May 15 10:22:12.222000 audit[3528]: USER_START pid=3528 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.224000 audit[3531]: CRED_ACQ pid=3531 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.382665 sshd[3528]: pam_unix(sshd:session): session closed for user core May 15 10:22:12.383000 audit[3528]: USER_END pid=3528 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.383000 audit[3528]: CRED_DISP pid=3528 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.386317 systemd[1]: sshd@10-10.0.0.103:22-10.0.0.1:47904.service: Deactivated successfully. May 15 10:22:12.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.103:22-10.0.0.1:47904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:12.386950 systemd[1]: session-11.scope: Deactivated successfully. May 15 10:22:12.390024 systemd[1]: Started sshd@11-10.0.0.103:22-10.0.0.1:47908.service. May 15 10:22:12.390499 systemd-logind[1203]: Session 11 logged out. Waiting for processes to exit. May 15 10:22:12.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.103:22-10.0.0.1:47908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:12.394568 systemd-logind[1203]: Removed session 11. May 15 10:22:12.432000 audit[3541]: USER_ACCT pid=3541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.434131 sshd[3541]: Accepted publickey for core from 10.0.0.1 port 47908 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:22:12.434000 audit[3541]: CRED_ACQ pid=3541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.434000 audit[3541]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc5285e90 a2=3 a3=1 items=0 ppid=1 pid=3541 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:12.434000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:22:12.435664 sshd[3541]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:22:12.438983 systemd-logind[1203]: New session 12 of user core. May 15 10:22:12.439778 systemd[1]: Started session-12.scope. May 15 10:22:12.441000 audit[3541]: USER_START pid=3541 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.443000 audit[3545]: CRED_ACQ pid=3545 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.557392 sshd[3541]: pam_unix(sshd:session): session closed for user core May 15 10:22:12.557000 audit[3541]: USER_END pid=3541 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.557000 audit[3541]: CRED_DISP pid=3541 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:12.559989 systemd[1]: sshd@11-10.0.0.103:22-10.0.0.1:47908.service: Deactivated successfully. May 15 10:22:12.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.103:22-10.0.0.1:47908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:12.560719 systemd[1]: session-12.scope: Deactivated successfully. May 15 10:22:12.561180 systemd-logind[1203]: Session 12 logged out. Waiting for processes to exit. May 15 10:22:12.561855 systemd-logind[1203]: Removed session 12. May 15 10:22:13.134287 env[1217]: time="2025-05-15T10:22:13.134237918Z" level=info msg="StopPodSandbox for \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\"" May 15 10:22:13.231677 kubelet[2061]: I0515 10:22:13.231016 2061 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-4shrs" podStartSLOduration=7.79737205 podStartE2EDuration="21.231000703s" podCreationTimestamp="2025-05-15 10:21:52 +0000 UTC" firstStartedPulling="2025-05-15 10:21:53.444565973 +0000 UTC m=+22.409952841" lastFinishedPulling="2025-05-15 10:22:06.878194666 +0000 UTC m=+35.843581494" observedRunningTime="2025-05-15 10:22:07.248960876 +0000 UTC m=+36.214347744" watchObservedRunningTime="2025-05-15 10:22:13.231000703 +0000 UTC m=+42.196387571" May 15 10:22:13.317987 env[1217]: 2025-05-15 10:22:13.231 [INFO][3594] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" May 15 10:22:13.317987 env[1217]: 2025-05-15 10:22:13.232 [INFO][3594] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" iface="eth0" netns="/var/run/netns/cni-0a63c1fd-7e39-0764-8f21-c90293dbeb63" May 15 10:22:13.317987 env[1217]: 2025-05-15 10:22:13.233 [INFO][3594] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" iface="eth0" netns="/var/run/netns/cni-0a63c1fd-7e39-0764-8f21-c90293dbeb63" May 15 10:22:13.317987 env[1217]: 2025-05-15 10:22:13.234 [INFO][3594] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" iface="eth0" netns="/var/run/netns/cni-0a63c1fd-7e39-0764-8f21-c90293dbeb63" May 15 10:22:13.317987 env[1217]: 2025-05-15 10:22:13.234 [INFO][3594] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" May 15 10:22:13.317987 env[1217]: 2025-05-15 10:22:13.234 [INFO][3594] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" May 15 10:22:13.317987 env[1217]: 2025-05-15 10:22:13.300 [INFO][3604] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" HandleID="k8s-pod-network.e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" Workload="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" May 15 10:22:13.317987 env[1217]: 2025-05-15 10:22:13.300 [INFO][3604] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:13.317987 env[1217]: 2025-05-15 10:22:13.300 [INFO][3604] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:13.317987 env[1217]: 2025-05-15 10:22:13.312 [WARNING][3604] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" HandleID="k8s-pod-network.e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" Workload="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" May 15 10:22:13.317987 env[1217]: 2025-05-15 10:22:13.312 [INFO][3604] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" HandleID="k8s-pod-network.e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" Workload="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" May 15 10:22:13.317987 env[1217]: 2025-05-15 10:22:13.314 [INFO][3604] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:13.317987 env[1217]: 2025-05-15 10:22:13.316 [INFO][3594] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" May 15 10:22:13.321281 env[1217]: time="2025-05-15T10:22:13.319272505Z" level=info msg="TearDown network for sandbox \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\" successfully" May 15 10:22:13.321281 env[1217]: time="2025-05-15T10:22:13.319309785Z" level=info msg="StopPodSandbox for \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\" returns successfully" May 15 10:22:13.321281 env[1217]: time="2025-05-15T10:22:13.319967500Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c4847f848-zht7m,Uid:a8c1e0fc-e162-4660-8541-ae03de4774d5,Namespace:calico-apiserver,Attempt:1,}" May 15 10:22:13.320169 systemd[1]: run-netns-cni\x2d0a63c1fd\x2d7e39\x2d0764\x2d8f21\x2dc90293dbeb63.mount: Deactivated successfully. May 15 10:22:13.505345 systemd-networkd[1043]: califb87df8d383: Link UP May 15 10:22:13.508313 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:22:13.508423 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califb87df8d383: link becomes ready May 15 10:22:13.508536 systemd-networkd[1043]: califb87df8d383: Gained carrier May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.373 [INFO][3613] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.390 [INFO][3613] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0 calico-apiserver-5c4847f848- calico-apiserver a8c1e0fc-e162-4660-8541-ae03de4774d5 853 0 2025-05-15 10:21:52 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5c4847f848 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5c4847f848-zht7m eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] califb87df8d383 [] []}} ContainerID="5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" Namespace="calico-apiserver" Pod="calico-apiserver-5c4847f848-zht7m" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c4847f848--zht7m-" May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.390 [INFO][3613] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" Namespace="calico-apiserver" Pod="calico-apiserver-5c4847f848-zht7m" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.426 [INFO][3627] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" HandleID="k8s-pod-network.5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" Workload="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.439 [INFO][3627] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" HandleID="k8s-pod-network.5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" Workload="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000503d10), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5c4847f848-zht7m", "timestamp":"2025-05-15 10:22:13.4263439 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.439 [INFO][3627] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.439 [INFO][3627] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.439 [INFO][3627] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.441 [INFO][3627] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" host="localhost" May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.450 [INFO][3627] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.455 [INFO][3627] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.457 [INFO][3627] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.459 [INFO][3627] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.459 [INFO][3627] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" host="localhost" May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.463 [INFO][3627] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3 May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.476 [INFO][3627] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" host="localhost" May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.494 [INFO][3627] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" host="localhost" May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.494 [INFO][3627] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" host="localhost" May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.494 [INFO][3627] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:13.522028 env[1217]: 2025-05-15 10:22:13.494 [INFO][3627] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" HandleID="k8s-pod-network.5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" Workload="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" May 15 10:22:13.522726 env[1217]: 2025-05-15 10:22:13.496 [INFO][3613] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" Namespace="calico-apiserver" Pod="calico-apiserver-5c4847f848-zht7m" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0", GenerateName:"calico-apiserver-5c4847f848-", Namespace:"calico-apiserver", SelfLink:"", UID:"a8c1e0fc-e162-4660-8541-ae03de4774d5", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c4847f848", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5c4847f848-zht7m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califb87df8d383", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:13.522726 env[1217]: 2025-05-15 10:22:13.496 [INFO][3613] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" Namespace="calico-apiserver" Pod="calico-apiserver-5c4847f848-zht7m" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" May 15 10:22:13.522726 env[1217]: 2025-05-15 10:22:13.496 [INFO][3613] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califb87df8d383 ContainerID="5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" Namespace="calico-apiserver" Pod="calico-apiserver-5c4847f848-zht7m" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" May 15 10:22:13.522726 env[1217]: 2025-05-15 10:22:13.508 [INFO][3613] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" Namespace="calico-apiserver" Pod="calico-apiserver-5c4847f848-zht7m" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" May 15 10:22:13.522726 env[1217]: 2025-05-15 10:22:13.509 [INFO][3613] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" Namespace="calico-apiserver" Pod="calico-apiserver-5c4847f848-zht7m" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0", GenerateName:"calico-apiserver-5c4847f848-", Namespace:"calico-apiserver", SelfLink:"", UID:"a8c1e0fc-e162-4660-8541-ae03de4774d5", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c4847f848", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3", Pod:"calico-apiserver-5c4847f848-zht7m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califb87df8d383", MAC:"fa:08:8f:d1:b8:93", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:13.522726 env[1217]: 2025-05-15 10:22:13.518 [INFO][3613] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3" Namespace="calico-apiserver" Pod="calico-apiserver-5c4847f848-zht7m" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" May 15 10:22:13.532763 env[1217]: time="2025-05-15T10:22:13.532687860Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:22:13.532763 env[1217]: time="2025-05-15T10:22:13.532732099Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:22:13.532763 env[1217]: time="2025-05-15T10:22:13.532742539Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:22:13.533011 env[1217]: time="2025-05-15T10:22:13.532859138Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3 pid=3658 runtime=io.containerd.runc.v2 May 15 10:22:13.550029 systemd[1]: Started cri-containerd-5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3.scope. May 15 10:22:13.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit: BPF prog-id=139 op=LOAD May 15 10:22:13.564000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[3667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3658 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:13.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538373135363566663863313733663332336666353334346632313463 May 15 10:22:13.564000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[3667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3658 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:13.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538373135363566663863313733663332336666353334346632313463 May 15 10:22:13.564000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.564000 audit: BPF prog-id=140 op=LOAD May 15 10:22:13.564000 audit[3667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3658 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:13.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538373135363566663863313733663332336666353334346632313463 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit: BPF prog-id=141 op=LOAD May 15 10:22:13.565000 audit[3667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3658 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:13.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538373135363566663863313733663332336666353334346632313463 May 15 10:22:13.565000 audit: BPF prog-id=141 op=UNLOAD May 15 10:22:13.565000 audit: BPF prog-id=140 op=UNLOAD May 15 10:22:13.565000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:13.565000 audit: BPF prog-id=142 op=LOAD May 15 10:22:13.565000 audit[3667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3658 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:13.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538373135363566663863313733663332336666353334346632313463 May 15 10:22:13.567075 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:22:13.583810 env[1217]: time="2025-05-15T10:22:13.583768034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c4847f848-zht7m,Uid:a8c1e0fc-e162-4660-8541-ae03de4774d5,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3\"" May 15 10:22:13.585719 env[1217]: time="2025-05-15T10:22:13.585688781Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:22:14.134543 env[1217]: time="2025-05-15T10:22:14.134478325Z" level=info msg="StopPodSandbox for \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\"" May 15 10:22:14.249344 env[1217]: 2025-05-15 10:22:14.201 [INFO][3731] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" May 15 10:22:14.249344 env[1217]: 2025-05-15 10:22:14.202 [INFO][3731] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" iface="eth0" netns="/var/run/netns/cni-be16cb82-711b-a4ce-21d4-7540ef2b1ae5" May 15 10:22:14.249344 env[1217]: 2025-05-15 10:22:14.202 [INFO][3731] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" iface="eth0" netns="/var/run/netns/cni-be16cb82-711b-a4ce-21d4-7540ef2b1ae5" May 15 10:22:14.249344 env[1217]: 2025-05-15 10:22:14.202 [INFO][3731] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" iface="eth0" netns="/var/run/netns/cni-be16cb82-711b-a4ce-21d4-7540ef2b1ae5" May 15 10:22:14.249344 env[1217]: 2025-05-15 10:22:14.202 [INFO][3731] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" May 15 10:22:14.249344 env[1217]: 2025-05-15 10:22:14.202 [INFO][3731] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" May 15 10:22:14.249344 env[1217]: 2025-05-15 10:22:14.233 [INFO][3739] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" HandleID="k8s-pod-network.59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" Workload="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" May 15 10:22:14.249344 env[1217]: 2025-05-15 10:22:14.233 [INFO][3739] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:14.249344 env[1217]: 2025-05-15 10:22:14.233 [INFO][3739] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:14.249344 env[1217]: 2025-05-15 10:22:14.241 [WARNING][3739] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" HandleID="k8s-pod-network.59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" Workload="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" May 15 10:22:14.249344 env[1217]: 2025-05-15 10:22:14.241 [INFO][3739] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" HandleID="k8s-pod-network.59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" Workload="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" May 15 10:22:14.249344 env[1217]: 2025-05-15 10:22:14.243 [INFO][3739] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:14.249344 env[1217]: 2025-05-15 10:22:14.244 [INFO][3731] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" May 15 10:22:14.250488 env[1217]: time="2025-05-15T10:22:14.249581084Z" level=info msg="TearDown network for sandbox \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\" successfully" May 15 10:22:14.250488 env[1217]: time="2025-05-15T10:22:14.249615204Z" level=info msg="StopPodSandbox for \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\" returns successfully" May 15 10:22:14.250488 env[1217]: time="2025-05-15T10:22:14.250294439Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c4847f848-xb28g,Uid:b79ed0d1-14ce-496a-97e8-22f5c01122ae,Namespace:calico-apiserver,Attempt:1,}" May 15 10:22:14.321067 systemd[1]: run-netns-cni\x2dbe16cb82\x2d711b\x2da4ce\x2d21d4\x2d7540ef2b1ae5.mount: Deactivated successfully. May 15 10:22:14.374712 systemd-networkd[1043]: cali29aa6264058: Link UP May 15 10:22:14.376435 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali29aa6264058: link becomes ready May 15 10:22:14.376240 systemd-networkd[1043]: cali29aa6264058: Gained carrier May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.282 [INFO][3746] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.297 [INFO][3746] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0 calico-apiserver-5c4847f848- calico-apiserver b79ed0d1-14ce-496a-97e8-22f5c01122ae 864 0 2025-05-15 10:21:52 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5c4847f848 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5c4847f848-xb28g eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali29aa6264058 [] []}} ContainerID="58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" Namespace="calico-apiserver" Pod="calico-apiserver-5c4847f848-xb28g" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c4847f848--xb28g-" May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.297 [INFO][3746] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" Namespace="calico-apiserver" Pod="calico-apiserver-5c4847f848-xb28g" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.329 [INFO][3761] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" HandleID="k8s-pod-network.58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" Workload="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.340 [INFO][3761] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" HandleID="k8s-pod-network.58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" Workload="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004dcf0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5c4847f848-xb28g", "timestamp":"2025-05-15 10:22:14.329100998 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.340 [INFO][3761] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.340 [INFO][3761] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.340 [INFO][3761] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.341 [INFO][3761] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" host="localhost" May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.345 [INFO][3761] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.350 [INFO][3761] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.351 [INFO][3761] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.354 [INFO][3761] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.354 [INFO][3761] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" host="localhost" May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.359 [INFO][3761] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43 May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.364 [INFO][3761] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" host="localhost" May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.370 [INFO][3761] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" host="localhost" May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.370 [INFO][3761] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" host="localhost" May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.370 [INFO][3761] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:14.395765 env[1217]: 2025-05-15 10:22:14.370 [INFO][3761] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" HandleID="k8s-pod-network.58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" Workload="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" May 15 10:22:14.396401 env[1217]: 2025-05-15 10:22:14.372 [INFO][3746] cni-plugin/k8s.go 386: Populated endpoint ContainerID="58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" Namespace="calico-apiserver" Pod="calico-apiserver-5c4847f848-xb28g" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0", GenerateName:"calico-apiserver-5c4847f848-", Namespace:"calico-apiserver", SelfLink:"", UID:"b79ed0d1-14ce-496a-97e8-22f5c01122ae", ResourceVersion:"864", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c4847f848", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5c4847f848-xb28g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali29aa6264058", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:14.396401 env[1217]: 2025-05-15 10:22:14.373 [INFO][3746] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" Namespace="calico-apiserver" Pod="calico-apiserver-5c4847f848-xb28g" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" May 15 10:22:14.396401 env[1217]: 2025-05-15 10:22:14.373 [INFO][3746] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali29aa6264058 ContainerID="58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" Namespace="calico-apiserver" Pod="calico-apiserver-5c4847f848-xb28g" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" May 15 10:22:14.396401 env[1217]: 2025-05-15 10:22:14.378 [INFO][3746] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" Namespace="calico-apiserver" Pod="calico-apiserver-5c4847f848-xb28g" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" May 15 10:22:14.396401 env[1217]: 2025-05-15 10:22:14.379 [INFO][3746] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" Namespace="calico-apiserver" Pod="calico-apiserver-5c4847f848-xb28g" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0", GenerateName:"calico-apiserver-5c4847f848-", Namespace:"calico-apiserver", SelfLink:"", UID:"b79ed0d1-14ce-496a-97e8-22f5c01122ae", ResourceVersion:"864", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c4847f848", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43", Pod:"calico-apiserver-5c4847f848-xb28g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali29aa6264058", MAC:"fa:af:c3:f4:f3:61", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:14.396401 env[1217]: 2025-05-15 10:22:14.393 [INFO][3746] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43" Namespace="calico-apiserver" Pod="calico-apiserver-5c4847f848-xb28g" WorkloadEndpoint="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" May 15 10:22:14.408850 env[1217]: time="2025-05-15T10:22:14.408777231Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:22:14.408850 env[1217]: time="2025-05-15T10:22:14.408815271Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:22:14.408850 env[1217]: time="2025-05-15T10:22:14.408825911Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:22:14.409038 env[1217]: time="2025-05-15T10:22:14.408945750Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43 pid=3786 runtime=io.containerd.runc.v2 May 15 10:22:14.425473 systemd[1]: run-containerd-runc-k8s.io-58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43-runc.pL3nbI.mount: Deactivated successfully. May 15 10:22:14.428346 systemd[1]: Started cri-containerd-58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43.scope. May 15 10:22:14.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.483000 audit: BPF prog-id=143 op=LOAD May 15 10:22:14.484000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3786 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:14.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538393537643762386336623034656237353238363566343834343639 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3786 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:14.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538393537643762386336623034656237353238363566343834343639 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit: BPF prog-id=144 op=LOAD May 15 10:22:14.484000 audit[3794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3786 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:14.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538393537643762386336623034656237353238363566343834343639 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit: BPF prog-id=145 op=LOAD May 15 10:22:14.484000 audit[3794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3786 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:14.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538393537643762386336623034656237353238363566343834343639 May 15 10:22:14.484000 audit: BPF prog-id=145 op=UNLOAD May 15 10:22:14.484000 audit: BPF prog-id=144 op=UNLOAD May 15 10:22:14.484000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.484000 audit: BPF prog-id=146 op=LOAD May 15 10:22:14.484000 audit[3794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3786 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:14.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538393537643762386336623034656237353238363566343834343639 May 15 10:22:14.487395 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:22:14.503361 env[1217]: time="2025-05-15T10:22:14.503307606Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c4847f848-xb28g,Uid:b79ed0d1-14ce-496a-97e8-22f5c01122ae,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43\"" May 15 10:22:15.354343 systemd-networkd[1043]: califb87df8d383: Gained IPv6LL May 15 10:22:15.512042 env[1217]: time="2025-05-15T10:22:15.511984532Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:15.513229 env[1217]: time="2025-05-15T10:22:15.513194605Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:15.514897 env[1217]: time="2025-05-15T10:22:15.514868954Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:15.516362 env[1217]: time="2025-05-15T10:22:15.516324944Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:15.517992 env[1217]: time="2025-05-15T10:22:15.517878494Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 15 10:22:15.520744 env[1217]: time="2025-05-15T10:22:15.520709236Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:22:15.524586 env[1217]: time="2025-05-15T10:22:15.524551691Z" level=info msg="CreateContainer within sandbox \"5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:22:15.537038 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount594150941.mount: Deactivated successfully. May 15 10:22:15.538683 env[1217]: time="2025-05-15T10:22:15.538635840Z" level=info msg="CreateContainer within sandbox \"5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"acdf54b5b4726bbaec7e9e3602c70683f5f9c80c9554b813024942f6a2ef6dff\"" May 15 10:22:15.539202 env[1217]: time="2025-05-15T10:22:15.539154957Z" level=info msg="StartContainer for \"acdf54b5b4726bbaec7e9e3602c70683f5f9c80c9554b813024942f6a2ef6dff\"" May 15 10:22:15.547894 systemd-networkd[1043]: cali29aa6264058: Gained IPv6LL May 15 10:22:15.559980 systemd[1]: Started cri-containerd-acdf54b5b4726bbaec7e9e3602c70683f5f9c80c9554b813024942f6a2ef6dff.scope. May 15 10:22:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.584000 audit: BPF prog-id=147 op=LOAD May 15 10:22:15.585000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.585000 audit[3853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3658 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:15.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163646635346235623437323662626165633765396533363032633730 May 15 10:22:15.586000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.586000 audit[3853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3658 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:15.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163646635346235623437323662626165633765396533363032633730 May 15 10:22:15.586000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.586000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.586000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.586000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.586000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.586000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.586000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.586000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.586000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.586000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.586000 audit: BPF prog-id=148 op=LOAD May 15 10:22:15.586000 audit[3853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3658 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:15.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163646635346235623437323662626165633765396533363032633730 May 15 10:22:15.587000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.587000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.587000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.587000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.587000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.587000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.587000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.587000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.587000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.587000 audit: BPF prog-id=149 op=LOAD May 15 10:22:15.587000 audit[3853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3658 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:15.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163646635346235623437323662626165633765396533363032633730 May 15 10:22:15.587000 audit: BPF prog-id=149 op=UNLOAD May 15 10:22:15.588000 audit: BPF prog-id=148 op=UNLOAD May 15 10:22:15.588000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.588000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.588000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.588000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.588000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.588000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.588000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.588000 audit[3853]: AVC avc: denied { perfmon } for pid=3853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.588000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.588000 audit[3853]: AVC avc: denied { bpf } for pid=3853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.588000 audit: BPF prog-id=150 op=LOAD May 15 10:22:15.588000 audit[3853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3658 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:15.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163646635346235623437323662626165633765396533363032633730 May 15 10:22:15.611424 env[1217]: time="2025-05-15T10:22:15.611301291Z" level=info msg="StartContainer for \"acdf54b5b4726bbaec7e9e3602c70683f5f9c80c9554b813024942f6a2ef6dff\" returns successfully" May 15 10:22:15.769108 env[1217]: time="2025-05-15T10:22:15.769064351Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:15.770387 env[1217]: time="2025-05-15T10:22:15.770359623Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:15.772383 env[1217]: time="2025-05-15T10:22:15.772353010Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:15.776425 env[1217]: time="2025-05-15T10:22:15.775931867Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:15.776535 env[1217]: time="2025-05-15T10:22:15.776495823Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 15 10:22:15.779194 env[1217]: time="2025-05-15T10:22:15.779144846Z" level=info msg="CreateContainer within sandbox \"58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:22:15.789425 env[1217]: time="2025-05-15T10:22:15.789378180Z" level=info msg="CreateContainer within sandbox \"58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"fa523cd1041f462ec45fa2821096d8c1e6c1e7a6eb30c2f55136441e73729692\"" May 15 10:22:15.789907 env[1217]: time="2025-05-15T10:22:15.789879416Z" level=info msg="StartContainer for \"fa523cd1041f462ec45fa2821096d8c1e6c1e7a6eb30c2f55136441e73729692\"" May 15 10:22:15.803919 systemd[1]: Started cri-containerd-fa523cd1041f462ec45fa2821096d8c1e6c1e7a6eb30c2f55136441e73729692.scope. May 15 10:22:15.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit: BPF prog-id=151 op=LOAD May 15 10:22:15.845000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3786 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:15.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661353233636431303431663436326563343566613238323130393664 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3786 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:15.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661353233636431303431663436326563343566613238323130393664 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit: BPF prog-id=152 op=LOAD May 15 10:22:15.845000 audit[3898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3786 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:15.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661353233636431303431663436326563343566613238323130393664 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.845000 audit: BPF prog-id=153 op=LOAD May 15 10:22:15.845000 audit[3898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3786 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:15.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661353233636431303431663436326563343566613238323130393664 May 15 10:22:15.845000 audit: BPF prog-id=153 op=UNLOAD May 15 10:22:15.845000 audit: BPF prog-id=152 op=UNLOAD May 15 10:22:15.846000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.846000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.846000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.846000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.846000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.846000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.846000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.846000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.846000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.846000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:15.846000 audit: BPF prog-id=154 op=LOAD May 15 10:22:15.846000 audit[3898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3786 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:15.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661353233636431303431663436326563343566613238323130393664 May 15 10:22:15.869268 env[1217]: time="2025-05-15T10:22:15.866044724Z" level=info msg="StartContainer for \"fa523cd1041f462ec45fa2821096d8c1e6c1e7a6eb30c2f55136441e73729692\" returns successfully" May 15 10:22:16.133953 env[1217]: time="2025-05-15T10:22:16.133843692Z" level=info msg="StopPodSandbox for \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\"" May 15 10:22:16.134820 env[1217]: time="2025-05-15T10:22:16.134323169Z" level=info msg="StopPodSandbox for \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\"" May 15 10:22:16.135203 env[1217]: time="2025-05-15T10:22:16.134413288Z" level=info msg="StopPodSandbox for \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\"" May 15 10:22:16.135620 env[1217]: time="2025-05-15T10:22:16.134440288Z" level=info msg="StopPodSandbox for \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\"" May 15 10:22:16.286879 kubelet[2061]: I0515 10:22:16.286807 2061 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5c4847f848-zht7m" podStartSLOduration=22.351519951 podStartE2EDuration="24.286790965s" podCreationTimestamp="2025-05-15 10:21:52 +0000 UTC" firstStartedPulling="2025-05-15 10:22:13.585261823 +0000 UTC m=+42.550648691" lastFinishedPulling="2025-05-15 10:22:15.520532837 +0000 UTC m=+44.485919705" observedRunningTime="2025-05-15 10:22:16.286511407 +0000 UTC m=+45.251898275" watchObservedRunningTime="2025-05-15 10:22:16.286790965 +0000 UTC m=+45.252177833" May 15 10:22:16.326982 kubelet[2061]: I0515 10:22:16.326909 2061 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5c4847f848-xb28g" podStartSLOduration=23.053677494 podStartE2EDuration="24.326891831s" podCreationTimestamp="2025-05-15 10:21:52 +0000 UTC" firstStartedPulling="2025-05-15 10:22:14.504525918 +0000 UTC m=+43.469912786" lastFinishedPulling="2025-05-15 10:22:15.777740255 +0000 UTC m=+44.743127123" observedRunningTime="2025-05-15 10:22:16.326411634 +0000 UTC m=+45.291798502" watchObservedRunningTime="2025-05-15 10:22:16.326891831 +0000 UTC m=+45.292278699" May 15 10:22:16.345247 env[1217]: 2025-05-15 10:22:16.228 [INFO][4008] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" May 15 10:22:16.345247 env[1217]: 2025-05-15 10:22:16.228 [INFO][4008] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" iface="eth0" netns="/var/run/netns/cni-f2045860-24ee-3989-6e48-9f6ad0317804" May 15 10:22:16.345247 env[1217]: 2025-05-15 10:22:16.229 [INFO][4008] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" iface="eth0" netns="/var/run/netns/cni-f2045860-24ee-3989-6e48-9f6ad0317804" May 15 10:22:16.345247 env[1217]: 2025-05-15 10:22:16.231 [INFO][4008] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" iface="eth0" netns="/var/run/netns/cni-f2045860-24ee-3989-6e48-9f6ad0317804" May 15 10:22:16.345247 env[1217]: 2025-05-15 10:22:16.231 [INFO][4008] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" May 15 10:22:16.345247 env[1217]: 2025-05-15 10:22:16.231 [INFO][4008] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" May 15 10:22:16.345247 env[1217]: 2025-05-15 10:22:16.290 [INFO][4037] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" HandleID="k8s-pod-network.81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" Workload="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" May 15 10:22:16.345247 env[1217]: 2025-05-15 10:22:16.291 [INFO][4037] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:16.345247 env[1217]: 2025-05-15 10:22:16.291 [INFO][4037] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:16.345247 env[1217]: 2025-05-15 10:22:16.331 [WARNING][4037] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" HandleID="k8s-pod-network.81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" Workload="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" May 15 10:22:16.345247 env[1217]: 2025-05-15 10:22:16.331 [INFO][4037] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" HandleID="k8s-pod-network.81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" Workload="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" May 15 10:22:16.345247 env[1217]: 2025-05-15 10:22:16.338 [INFO][4037] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:16.345247 env[1217]: 2025-05-15 10:22:16.341 [INFO][4008] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" May 15 10:22:16.345701 env[1217]: time="2025-05-15T10:22:16.345385914Z" level=info msg="TearDown network for sandbox \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\" successfully" May 15 10:22:16.345701 env[1217]: time="2025-05-15T10:22:16.345421434Z" level=info msg="StopPodSandbox for \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\" returns successfully" May 15 10:22:16.346808 env[1217]: time="2025-05-15T10:22:16.346767386Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74bdffb748-sc7rm,Uid:53220aaf-f836-49cd-aefa-94243d2976b9,Namespace:calico-system,Attempt:1,}" May 15 10:22:16.365274 env[1217]: 2025-05-15 10:22:16.253 [INFO][4007] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" May 15 10:22:16.365274 env[1217]: 2025-05-15 10:22:16.253 [INFO][4007] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" iface="eth0" netns="/var/run/netns/cni-447355d5-6eb5-7804-d6ac-1993d10899bc" May 15 10:22:16.365274 env[1217]: 2025-05-15 10:22:16.255 [INFO][4007] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" iface="eth0" netns="/var/run/netns/cni-447355d5-6eb5-7804-d6ac-1993d10899bc" May 15 10:22:16.365274 env[1217]: 2025-05-15 10:22:16.255 [INFO][4007] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" iface="eth0" netns="/var/run/netns/cni-447355d5-6eb5-7804-d6ac-1993d10899bc" May 15 10:22:16.365274 env[1217]: 2025-05-15 10:22:16.255 [INFO][4007] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" May 15 10:22:16.365274 env[1217]: 2025-05-15 10:22:16.256 [INFO][4007] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" May 15 10:22:16.365274 env[1217]: 2025-05-15 10:22:16.318 [INFO][4043] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" HandleID="k8s-pod-network.efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" Workload="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" May 15 10:22:16.365274 env[1217]: 2025-05-15 10:22:16.318 [INFO][4043] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:16.365274 env[1217]: 2025-05-15 10:22:16.338 [INFO][4043] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:16.365274 env[1217]: 2025-05-15 10:22:16.349 [WARNING][4043] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" HandleID="k8s-pod-network.efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" Workload="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" May 15 10:22:16.365274 env[1217]: 2025-05-15 10:22:16.351 [INFO][4043] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" HandleID="k8s-pod-network.efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" Workload="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" May 15 10:22:16.365274 env[1217]: 2025-05-15 10:22:16.359 [INFO][4043] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:16.365274 env[1217]: 2025-05-15 10:22:16.363 [INFO][4007] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" May 15 10:22:16.366322 env[1217]: time="2025-05-15T10:22:16.366288742Z" level=info msg="TearDown network for sandbox \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\" successfully" May 15 10:22:16.366419 env[1217]: time="2025-05-15T10:22:16.366402661Z" level=info msg="StopPodSandbox for \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\" returns successfully" May 15 10:22:16.366752 kubelet[2061]: E0515 10:22:16.366723 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:16.367562 env[1217]: time="2025-05-15T10:22:16.367513654Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-tvb89,Uid:7053c2cf-5dbb-4d82-8c91-e2174a115431,Namespace:kube-system,Attempt:1,}" May 15 10:22:16.374000 audit[4077]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=4077 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:16.374000 audit[4077]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=fffffe293550 a2=0 a3=1 items=0 ppid=2262 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.374000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:16.376665 env[1217]: 2025-05-15 10:22:16.267 [INFO][4009] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" May 15 10:22:16.376665 env[1217]: 2025-05-15 10:22:16.268 [INFO][4009] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" iface="eth0" netns="/var/run/netns/cni-5b752270-f928-c38b-bb01-e733b0cd055b" May 15 10:22:16.376665 env[1217]: 2025-05-15 10:22:16.268 [INFO][4009] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" iface="eth0" netns="/var/run/netns/cni-5b752270-f928-c38b-bb01-e733b0cd055b" May 15 10:22:16.376665 env[1217]: 2025-05-15 10:22:16.268 [INFO][4009] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" iface="eth0" netns="/var/run/netns/cni-5b752270-f928-c38b-bb01-e733b0cd055b" May 15 10:22:16.376665 env[1217]: 2025-05-15 10:22:16.268 [INFO][4009] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" May 15 10:22:16.376665 env[1217]: 2025-05-15 10:22:16.268 [INFO][4009] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" May 15 10:22:16.376665 env[1217]: 2025-05-15 10:22:16.340 [INFO][4054] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" HandleID="k8s-pod-network.d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" Workload="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" May 15 10:22:16.376665 env[1217]: 2025-05-15 10:22:16.341 [INFO][4054] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:16.376665 env[1217]: 2025-05-15 10:22:16.359 [INFO][4054] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:16.376665 env[1217]: 2025-05-15 10:22:16.368 [WARNING][4054] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" HandleID="k8s-pod-network.d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" Workload="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" May 15 10:22:16.376665 env[1217]: 2025-05-15 10:22:16.368 [INFO][4054] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" HandleID="k8s-pod-network.d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" Workload="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" May 15 10:22:16.376665 env[1217]: 2025-05-15 10:22:16.370 [INFO][4054] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:16.376665 env[1217]: 2025-05-15 10:22:16.371 [INFO][4009] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" May 15 10:22:16.377004 env[1217]: time="2025-05-15T10:22:16.376776316Z" level=info msg="TearDown network for sandbox \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\" successfully" May 15 10:22:16.377004 env[1217]: time="2025-05-15T10:22:16.376801076Z" level=info msg="StopPodSandbox for \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\" returns successfully" May 15 10:22:16.377077 kubelet[2061]: E0515 10:22:16.377051 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:16.377548 env[1217]: time="2025-05-15T10:22:16.377524391Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-59vhs,Uid:0f11ae80-4684-4751-8047-b43bdb1f9716,Namespace:kube-system,Attempt:1,}" May 15 10:22:16.380000 audit[4077]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=4077 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:16.380000 audit[4077]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffffe293550 a2=0 a3=1 items=0 ppid=2262 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.380000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:16.396000 audit[4087]: NETFILTER_CFG table=filter:97 family=2 entries=18 op=nft_register_rule pid=4087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:16.396000 audit[4087]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=fffffa4252e0 a2=0 a3=1 items=0 ppid=2262 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.396000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:16.401817 env[1217]: 2025-05-15 10:22:16.264 [INFO][4013] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" May 15 10:22:16.401817 env[1217]: 2025-05-15 10:22:16.264 [INFO][4013] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" iface="eth0" netns="/var/run/netns/cni-73e0ba93-2c0e-2f7f-5b4a-13fe2ecbb4f1" May 15 10:22:16.401817 env[1217]: 2025-05-15 10:22:16.264 [INFO][4013] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" iface="eth0" netns="/var/run/netns/cni-73e0ba93-2c0e-2f7f-5b4a-13fe2ecbb4f1" May 15 10:22:16.401817 env[1217]: 2025-05-15 10:22:16.264 [INFO][4013] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" iface="eth0" netns="/var/run/netns/cni-73e0ba93-2c0e-2f7f-5b4a-13fe2ecbb4f1" May 15 10:22:16.401817 env[1217]: 2025-05-15 10:22:16.264 [INFO][4013] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" May 15 10:22:16.401817 env[1217]: 2025-05-15 10:22:16.264 [INFO][4013] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" May 15 10:22:16.401817 env[1217]: 2025-05-15 10:22:16.380 [INFO][4048] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" HandleID="k8s-pod-network.d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" Workload="localhost-k8s-csi--node--driver--2lh5x-eth0" May 15 10:22:16.401817 env[1217]: 2025-05-15 10:22:16.380 [INFO][4048] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:16.401817 env[1217]: 2025-05-15 10:22:16.380 [INFO][4048] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:16.401817 env[1217]: 2025-05-15 10:22:16.389 [WARNING][4048] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" HandleID="k8s-pod-network.d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" Workload="localhost-k8s-csi--node--driver--2lh5x-eth0" May 15 10:22:16.401817 env[1217]: 2025-05-15 10:22:16.389 [INFO][4048] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" HandleID="k8s-pod-network.d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" Workload="localhost-k8s-csi--node--driver--2lh5x-eth0" May 15 10:22:16.401817 env[1217]: 2025-05-15 10:22:16.392 [INFO][4048] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:16.401817 env[1217]: 2025-05-15 10:22:16.395 [INFO][4013] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" May 15 10:22:16.402409 env[1217]: time="2025-05-15T10:22:16.401979036Z" level=info msg="TearDown network for sandbox \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\" successfully" May 15 10:22:16.402409 env[1217]: time="2025-05-15T10:22:16.402014036Z" level=info msg="StopPodSandbox for \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\" returns successfully" May 15 10:22:16.402711 env[1217]: time="2025-05-15T10:22:16.402678392Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2lh5x,Uid:ef184343-07cc-49e8-9335-04743ecda65a,Namespace:calico-system,Attempt:1,}" May 15 10:22:16.405000 audit[4087]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=4087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:16.405000 audit[4087]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffffa4252e0 a2=0 a3=1 items=0 ppid=2262 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.405000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:16.537081 systemd[1]: run-containerd-runc-k8s.io-acdf54b5b4726bbaec7e9e3602c70683f5f9c80c9554b813024942f6a2ef6dff-runc.SlWv4S.mount: Deactivated successfully. May 15 10:22:16.537199 systemd[1]: run-netns-cni\x2d73e0ba93\x2d2c0e\x2d2f7f\x2d5b4a\x2d13fe2ecbb4f1.mount: Deactivated successfully. May 15 10:22:16.537247 systemd[1]: run-netns-cni\x2d5b752270\x2df928\x2dc38b\x2dbb01\x2de733b0cd055b.mount: Deactivated successfully. May 15 10:22:16.537291 systemd[1]: run-netns-cni\x2df2045860\x2d24ee\x2d3989\x2d6e48\x2d9f6ad0317804.mount: Deactivated successfully. May 15 10:22:16.537333 systemd[1]: run-netns-cni\x2d447355d5\x2d6eb5\x2d7804\x2dd6ac\x2d1993d10899bc.mount: Deactivated successfully. May 15 10:22:16.556492 systemd-networkd[1043]: cali2da053663fd: Link UP May 15 10:22:16.558862 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:22:16.558966 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2da053663fd: link becomes ready May 15 10:22:16.558940 systemd-networkd[1043]: cali2da053663fd: Gained carrier May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.409 [INFO][4072] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.430 [INFO][4072] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0 calico-kube-controllers-74bdffb748- calico-system 53220aaf-f836-49cd-aefa-94243d2976b9 896 0 2025-05-15 10:21:52 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:74bdffb748 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-74bdffb748-sc7rm eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali2da053663fd [] []}} ContainerID="dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" Namespace="calico-system" Pod="calico-kube-controllers-74bdffb748-sc7rm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-" May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.430 [INFO][4072] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" Namespace="calico-system" Pod="calico-kube-controllers-74bdffb748-sc7rm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.486 [INFO][4126] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" HandleID="k8s-pod-network.dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" Workload="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.503 [INFO][4126] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" HandleID="k8s-pod-network.dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" Workload="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000502750), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-74bdffb748-sc7rm", "timestamp":"2025-05-15 10:22:16.486676381 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.503 [INFO][4126] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.503 [INFO][4126] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.503 [INFO][4126] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.510 [INFO][4126] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" host="localhost" May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.515 [INFO][4126] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.527 [INFO][4126] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.529 [INFO][4126] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.538 [INFO][4126] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.538 [INFO][4126] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" host="localhost" May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.540 [INFO][4126] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.544 [INFO][4126] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" host="localhost" May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.550 [INFO][4126] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" host="localhost" May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.550 [INFO][4126] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" host="localhost" May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.550 [INFO][4126] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:16.577601 env[1217]: 2025-05-15 10:22:16.550 [INFO][4126] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" HandleID="k8s-pod-network.dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" Workload="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" May 15 10:22:16.578552 env[1217]: 2025-05-15 10:22:16.553 [INFO][4072] cni-plugin/k8s.go 386: Populated endpoint ContainerID="dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" Namespace="calico-system" Pod="calico-kube-controllers-74bdffb748-sc7rm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0", GenerateName:"calico-kube-controllers-74bdffb748-", Namespace:"calico-system", SelfLink:"", UID:"53220aaf-f836-49cd-aefa-94243d2976b9", ResourceVersion:"896", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74bdffb748", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-74bdffb748-sc7rm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali2da053663fd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:16.578552 env[1217]: 2025-05-15 10:22:16.553 [INFO][4072] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" Namespace="calico-system" Pod="calico-kube-controllers-74bdffb748-sc7rm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" May 15 10:22:16.578552 env[1217]: 2025-05-15 10:22:16.553 [INFO][4072] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2da053663fd ContainerID="dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" Namespace="calico-system" Pod="calico-kube-controllers-74bdffb748-sc7rm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" May 15 10:22:16.578552 env[1217]: 2025-05-15 10:22:16.561 [INFO][4072] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" Namespace="calico-system" Pod="calico-kube-controllers-74bdffb748-sc7rm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" May 15 10:22:16.578552 env[1217]: 2025-05-15 10:22:16.564 [INFO][4072] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" Namespace="calico-system" Pod="calico-kube-controllers-74bdffb748-sc7rm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0", GenerateName:"calico-kube-controllers-74bdffb748-", Namespace:"calico-system", SelfLink:"", UID:"53220aaf-f836-49cd-aefa-94243d2976b9", ResourceVersion:"896", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74bdffb748", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a", Pod:"calico-kube-controllers-74bdffb748-sc7rm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali2da053663fd", MAC:"2e:39:29:9b:b9:47", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:16.578552 env[1217]: 2025-05-15 10:22:16.575 [INFO][4072] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a" Namespace="calico-system" Pod="calico-kube-controllers-74bdffb748-sc7rm" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" May 15 10:22:16.623128 env[1217]: time="2025-05-15T10:22:16.622696961Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:22:16.623128 env[1217]: time="2025-05-15T10:22:16.622766440Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:22:16.623128 env[1217]: time="2025-05-15T10:22:16.622777040Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:22:16.623128 env[1217]: time="2025-05-15T10:22:16.622932999Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a pid=4189 runtime=io.containerd.runc.v2 May 15 10:22:16.646356 systemd-networkd[1043]: cali39fc51fd850: Link UP May 15 10:22:16.647503 systemd-networkd[1043]: cali39fc51fd850: Gained carrier May 15 10:22:16.648200 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali39fc51fd850: link becomes ready May 15 10:22:16.671141 systemd[1]: Started cri-containerd-dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a.scope. May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.455 [INFO][4098] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.484 [INFO][4098] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0 coredns-7db6d8ff4d- kube-system 7053c2cf-5dbb-4d82-8c91-e2174a115431 897 0 2025-05-15 10:21:45 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-tvb89 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali39fc51fd850 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-tvb89" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--tvb89-" May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.484 [INFO][4098] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-tvb89" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.562 [INFO][4143] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" HandleID="k8s-pod-network.3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" Workload="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.592 [INFO][4143] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" HandleID="k8s-pod-network.3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" Workload="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000360a30), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-tvb89", "timestamp":"2025-05-15 10:22:16.562903779 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.592 [INFO][4143] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.592 [INFO][4143] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.592 [INFO][4143] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.597 [INFO][4143] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" host="localhost" May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.605 [INFO][4143] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.616 [INFO][4143] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.621 [INFO][4143] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.626 [INFO][4143] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.626 [INFO][4143] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" host="localhost" May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.627 [INFO][4143] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.632 [INFO][4143] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" host="localhost" May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.638 [INFO][4143] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" host="localhost" May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.638 [INFO][4143] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" host="localhost" May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.638 [INFO][4143] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:16.674609 env[1217]: 2025-05-15 10:22:16.638 [INFO][4143] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" HandleID="k8s-pod-network.3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" Workload="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" May 15 10:22:16.675169 env[1217]: 2025-05-15 10:22:16.643 [INFO][4098] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-tvb89" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"7053c2cf-5dbb-4d82-8c91-e2174a115431", ResourceVersion:"897", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-tvb89", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali39fc51fd850", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:16.675169 env[1217]: 2025-05-15 10:22:16.643 [INFO][4098] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-tvb89" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" May 15 10:22:16.675169 env[1217]: 2025-05-15 10:22:16.643 [INFO][4098] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali39fc51fd850 ContainerID="3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-tvb89" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" May 15 10:22:16.675169 env[1217]: 2025-05-15 10:22:16.647 [INFO][4098] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-tvb89" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" May 15 10:22:16.675169 env[1217]: 2025-05-15 10:22:16.647 [INFO][4098] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-tvb89" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"7053c2cf-5dbb-4d82-8c91-e2174a115431", ResourceVersion:"897", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f", Pod:"coredns-7db6d8ff4d-tvb89", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali39fc51fd850", MAC:"82:1e:11:df:d8:14", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:16.675169 env[1217]: 2025-05-15 10:22:16.665 [INFO][4098] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-tvb89" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" May 15 10:22:16.713513 systemd-networkd[1043]: calida3546e7ce4: Link UP May 15 10:22:16.715223 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calida3546e7ce4: link becomes ready May 15 10:22:16.718854 systemd-networkd[1043]: calida3546e7ce4: Gained carrier May 15 10:22:16.725539 env[1217]: time="2025-05-15T10:22:16.725455231Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:22:16.725654 env[1217]: time="2025-05-15T10:22:16.725505991Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:22:16.725654 env[1217]: time="2025-05-15T10:22:16.725516631Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:22:16.725763 env[1217]: time="2025-05-15T10:22:16.725652470Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f pid=4235 runtime=io.containerd.runc.v2 May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.462 [INFO][4088] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.496 [INFO][4088] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0 coredns-7db6d8ff4d- kube-system 0f11ae80-4684-4751-8047-b43bdb1f9716 899 0 2025-05-15 10:21:45 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-59vhs eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calida3546e7ce4 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-59vhs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--59vhs-" May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.497 [INFO][4088] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-59vhs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.583 [INFO][4149] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" HandleID="k8s-pod-network.2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" Workload="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.599 [INFO][4149] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" HandleID="k8s-pod-network.2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" Workload="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002faac0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-59vhs", "timestamp":"2025-05-15 10:22:16.582982332 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.599 [INFO][4149] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.638 [INFO][4149] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.639 [INFO][4149] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.643 [INFO][4149] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" host="localhost" May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.666 [INFO][4149] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.675 [INFO][4149] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.678 [INFO][4149] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.681 [INFO][4149] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.681 [INFO][4149] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" host="localhost" May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.684 [INFO][4149] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.696 [INFO][4149] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" host="localhost" May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.705 [INFO][4149] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" host="localhost" May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.705 [INFO][4149] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" host="localhost" May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.705 [INFO][4149] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:16.743865 env[1217]: 2025-05-15 10:22:16.705 [INFO][4149] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" HandleID="k8s-pod-network.2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" Workload="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" May 15 10:22:16.752843 env[1217]: 2025-05-15 10:22:16.709 [INFO][4088] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-59vhs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"0f11ae80-4684-4751-8047-b43bdb1f9716", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-59vhs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calida3546e7ce4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:16.752843 env[1217]: 2025-05-15 10:22:16.709 [INFO][4088] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-59vhs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" May 15 10:22:16.752843 env[1217]: 2025-05-15 10:22:16.709 [INFO][4088] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calida3546e7ce4 ContainerID="2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-59vhs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" May 15 10:22:16.752843 env[1217]: 2025-05-15 10:22:16.721 [INFO][4088] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-59vhs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" May 15 10:22:16.752843 env[1217]: 2025-05-15 10:22:16.722 [INFO][4088] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-59vhs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"0f11ae80-4684-4751-8047-b43bdb1f9716", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b", Pod:"coredns-7db6d8ff4d-59vhs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calida3546e7ce4", MAC:"92:a7:c8:24:77:c3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:16.752843 env[1217]: 2025-05-15 10:22:16.738 [INFO][4088] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-59vhs" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" May 15 10:22:16.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.751000 audit: BPF prog-id=155 op=LOAD May 15 10:22:16.752000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4189 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463656439613531356639343161653938643661316632653566343536 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4189 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463656439613531356639343161653938643661316632653566343536 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit: BPF prog-id=156 op=LOAD May 15 10:22:16.752000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4189 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463656439613531356639343161653938643661316632653566343536 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit: BPF prog-id=157 op=LOAD May 15 10:22:16.752000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4189 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463656439613531356639343161653938643661316632653566343536 May 15 10:22:16.752000 audit: BPF prog-id=157 op=UNLOAD May 15 10:22:16.752000 audit: BPF prog-id=156 op=UNLOAD May 15 10:22:16.752000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.752000 audit: BPF prog-id=158 op=LOAD May 15 10:22:16.752000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4189 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463656439613531356639343161653938643661316632653566343536 May 15 10:22:16.745360 systemd[1]: Started cri-containerd-3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f.scope. May 15 10:22:16.756753 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:22:16.766235 env[1217]: time="2025-05-15T10:22:16.766152414Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:22:16.766235 env[1217]: time="2025-05-15T10:22:16.766205373Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:22:16.766235 env[1217]: time="2025-05-15T10:22:16.766216573Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:22:16.766587 env[1217]: time="2025-05-15T10:22:16.766535571Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b pid=4281 runtime=io.containerd.runc.v2 May 15 10:22:16.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit: BPF prog-id=159 op=LOAD May 15 10:22:16.772000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4235 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366303861306532363664633363356463383036303437623432656131 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4235 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366303861306532363664633363356463383036303437623432656131 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit: BPF prog-id=160 op=LOAD May 15 10:22:16.772000 audit[4245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4235 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366303861306532363664633363356463383036303437623432656131 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit: BPF prog-id=161 op=LOAD May 15 10:22:16.772000 audit[4245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4235 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366303861306532363664633363356463383036303437623432656131 May 15 10:22:16.772000 audit: BPF prog-id=161 op=UNLOAD May 15 10:22:16.772000 audit: BPF prog-id=160 op=UNLOAD May 15 10:22:16.772000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.772000 audit: BPF prog-id=162 op=LOAD May 15 10:22:16.772000 audit[4245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4235 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366303861306532363664633363356463383036303437623432656131 May 15 10:22:16.774630 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:22:16.780200 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliaee07c7a74e: link becomes ready May 15 10:22:16.780394 systemd-networkd[1043]: caliaee07c7a74e: Link UP May 15 10:22:16.780586 systemd-networkd[1043]: caliaee07c7a74e: Gained carrier May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.502 [INFO][4115] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.529 [INFO][4115] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--2lh5x-eth0 csi-node-driver- calico-system ef184343-07cc-49e8-9335-04743ecda65a 898 0 2025-05-15 10:21:52 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-2lh5x eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] caliaee07c7a74e [] []}} ContainerID="a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" Namespace="calico-system" Pod="csi-node-driver-2lh5x" WorkloadEndpoint="localhost-k8s-csi--node--driver--2lh5x-" May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.530 [INFO][4115] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" Namespace="calico-system" Pod="csi-node-driver-2lh5x" WorkloadEndpoint="localhost-k8s-csi--node--driver--2lh5x-eth0" May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.608 [INFO][4156] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" HandleID="k8s-pod-network.a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" Workload="localhost-k8s-csi--node--driver--2lh5x-eth0" May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.621 [INFO][4156] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" HandleID="k8s-pod-network.a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" Workload="localhost-k8s-csi--node--driver--2lh5x-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004c030), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-2lh5x", "timestamp":"2025-05-15 10:22:16.608210212 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.621 [INFO][4156] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.705 [INFO][4156] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.705 [INFO][4156] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.709 [INFO][4156] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" host="localhost" May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.723 [INFO][4156] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.737 [INFO][4156] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.739 [INFO][4156] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.743 [INFO][4156] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.743 [INFO][4156] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" host="localhost" May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.751 [INFO][4156] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.760 [INFO][4156] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" host="localhost" May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.771 [INFO][4156] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" host="localhost" May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.771 [INFO][4156] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" host="localhost" May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.771 [INFO][4156] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:16.799946 env[1217]: 2025-05-15 10:22:16.771 [INFO][4156] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" HandleID="k8s-pod-network.a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" Workload="localhost-k8s-csi--node--driver--2lh5x-eth0" May 15 10:22:16.800598 env[1217]: 2025-05-15 10:22:16.773 [INFO][4115] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" Namespace="calico-system" Pod="csi-node-driver-2lh5x" WorkloadEndpoint="localhost-k8s-csi--node--driver--2lh5x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--2lh5x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ef184343-07cc-49e8-9335-04743ecda65a", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-2lh5x", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaee07c7a74e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:16.800598 env[1217]: 2025-05-15 10:22:16.774 [INFO][4115] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" Namespace="calico-system" Pod="csi-node-driver-2lh5x" WorkloadEndpoint="localhost-k8s-csi--node--driver--2lh5x-eth0" May 15 10:22:16.800598 env[1217]: 2025-05-15 10:22:16.774 [INFO][4115] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliaee07c7a74e ContainerID="a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" Namespace="calico-system" Pod="csi-node-driver-2lh5x" WorkloadEndpoint="localhost-k8s-csi--node--driver--2lh5x-eth0" May 15 10:22:16.800598 env[1217]: 2025-05-15 10:22:16.780 [INFO][4115] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" Namespace="calico-system" Pod="csi-node-driver-2lh5x" WorkloadEndpoint="localhost-k8s-csi--node--driver--2lh5x-eth0" May 15 10:22:16.800598 env[1217]: 2025-05-15 10:22:16.782 [INFO][4115] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" Namespace="calico-system" Pod="csi-node-driver-2lh5x" WorkloadEndpoint="localhost-k8s-csi--node--driver--2lh5x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--2lh5x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ef184343-07cc-49e8-9335-04743ecda65a", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce", Pod:"csi-node-driver-2lh5x", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaee07c7a74e", MAC:"3a:4a:66:8a:b4:6d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:16.800598 env[1217]: 2025-05-15 10:22:16.793 [INFO][4115] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce" Namespace="calico-system" Pod="csi-node-driver-2lh5x" WorkloadEndpoint="localhost-k8s-csi--node--driver--2lh5x-eth0" May 15 10:22:16.801225 env[1217]: time="2025-05-15T10:22:16.800871674Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74bdffb748-sc7rm,Uid:53220aaf-f836-49cd-aefa-94243d2976b9,Namespace:calico-system,Attempt:1,} returns sandbox id \"dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a\"" May 15 10:22:16.801039 systemd[1]: Started cri-containerd-2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b.scope. May 15 10:22:16.803857 env[1217]: time="2025-05-15T10:22:16.803796776Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 15 10:22:16.829004 env[1217]: time="2025-05-15T10:22:16.828931777Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-tvb89,Uid:7053c2cf-5dbb-4d82-8c91-e2174a115431,Namespace:kube-system,Attempt:1,} returns sandbox id \"3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f\"" May 15 10:22:16.829663 kubelet[2061]: E0515 10:22:16.829624 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:16.831790 env[1217]: time="2025-05-15T10:22:16.831746199Z" level=info msg="CreateContainer within sandbox \"3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:22:16.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.847000 audit: BPF prog-id=163 op=LOAD May 15 10:22:16.848000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.848000 audit[4291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4281 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264633030316431313030306330353532646537333939646565616439 May 15 10:22:16.848000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.848000 audit[4291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4281 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264633030316431313030306330353532646537333939646565616439 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit: BPF prog-id=164 op=LOAD May 15 10:22:16.849000 audit[4291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4281 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264633030316431313030306330353532646537333939646565616439 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit: BPF prog-id=165 op=LOAD May 15 10:22:16.849000 audit[4291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4281 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264633030316431313030306330353532646537333939646565616439 May 15 10:22:16.849000 audit: BPF prog-id=165 op=UNLOAD May 15 10:22:16.849000 audit: BPF prog-id=164 op=UNLOAD May 15 10:22:16.849000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.849000 audit: BPF prog-id=166 op=LOAD May 15 10:22:16.849000 audit[4291]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4281 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264633030316431313030306330353532646537333939646565616439 May 15 10:22:16.855565 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:22:16.859292 env[1217]: time="2025-05-15T10:22:16.857574596Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:22:16.859292 env[1217]: time="2025-05-15T10:22:16.857624315Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:22:16.859292 env[1217]: time="2025-05-15T10:22:16.857637795Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:22:16.859292 env[1217]: time="2025-05-15T10:22:16.857765515Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce pid=4341 runtime=io.containerd.runc.v2 May 15 10:22:16.873000 audit[3864]: AVC avc: denied { watch } for pid=3864 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_22_00.1169398104/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c81 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c57,c81 tclass=file permissive=0 May 15 10:22:16.873000 audit[3864]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4001303f00 a2=fc6 a3=0 items=0 ppid=3658 pid=3864 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c81 key=(null) May 15 10:22:16.873000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:22:16.878064 systemd[1]: Started cri-containerd-a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce.scope. May 15 10:22:16.884272 env[1217]: time="2025-05-15T10:22:16.884233907Z" level=info msg="CreateContainer within sandbox \"3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a4b8e8ed1a82c74992c90915181206ef5ffe94557e429fd280c8236db60b1a74\"" May 15 10:22:16.885849 env[1217]: time="2025-05-15T10:22:16.884938263Z" level=info msg="StartContainer for \"a4b8e8ed1a82c74992c90915181206ef5ffe94557e429fd280c8236db60b1a74\"" May 15 10:22:16.904603 env[1217]: time="2025-05-15T10:22:16.904336340Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-59vhs,Uid:0f11ae80-4684-4751-8047-b43bdb1f9716,Namespace:kube-system,Attempt:1,} returns sandbox id \"2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b\"" May 15 10:22:16.905149 kubelet[2061]: E0515 10:22:16.905083 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:16.907531 env[1217]: time="2025-05-15T10:22:16.907315561Z" level=info msg="CreateContainer within sandbox \"2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:22:16.916832 systemd[1]: Started cri-containerd-a4b8e8ed1a82c74992c90915181206ef5ffe94557e429fd280c8236db60b1a74.scope. May 15 10:22:16.956746 kernel: kauditd_printk_skb: 437 callbacks suppressed May 15 10:22:16.956833 kernel: audit: type=1400 audit(1747304536.954:1201): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.958281 env[1217]: time="2025-05-15T10:22:16.958242799Z" level=info msg="CreateContainer within sandbox \"2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"56f484df3d4d636ebaf0dcdd40f68f72235249d74ce4cc75e95abdb073bc0d1f\"" May 15 10:22:16.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.960659 env[1217]: time="2025-05-15T10:22:16.960627144Z" level=info msg="StartContainer for \"56f484df3d4d636ebaf0dcdd40f68f72235249d74ce4cc75e95abdb073bc0d1f\"" May 15 10:22:16.964850 kernel: audit: type=1400 audit(1747304536.954:1202): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.964926 kernel: audit: type=1400 audit(1747304536.954:1203): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.968886 kernel: audit: type=1400 audit(1747304536.954:1204): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.973518 kernel: audit: type=1400 audit(1747304536.954:1205): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.973688 systemd-resolved[1154]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:22:16.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.979325 kernel: audit: type=1400 audit(1747304536.954:1206): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.986060 kernel: audit: type=1400 audit(1747304536.954:1207): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.985085 systemd[1]: Started cri-containerd-56f484df3d4d636ebaf0dcdd40f68f72235249d74ce4cc75e95abdb073bc0d1f.scope. May 15 10:22:16.996619 kernel: audit: type=1400 audit(1747304536.954:1208): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.996715 kernel: audit: type=1400 audit(1747304536.954:1209): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.999740 kernel: audit: type=1400 audit(1747304536.956:1210): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.956000 audit: BPF prog-id=167 op=LOAD May 15 10:22:16.956000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.956000 audit[4349]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4341 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132613639613731343733386162613337323634663732333664613836 May 15 10:22:16.956000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.956000 audit[4349]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4341 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132613639613731343733386162613337323634663732333664613836 May 15 10:22:16.956000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.956000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.956000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.956000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.956000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.956000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.956000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.956000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.956000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.956000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.956000 audit: BPF prog-id=168 op=LOAD May 15 10:22:16.956000 audit[4349]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4341 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132613639613731343733386162613337323634663732333664613836 May 15 10:22:16.958000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.958000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.958000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.958000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.958000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.958000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.958000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.958000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.958000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.958000 audit: BPF prog-id=169 op=LOAD May 15 10:22:16.958000 audit[4349]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4341 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132613639613731343733386162613337323634663732333664613836 May 15 10:22:16.961000 audit: BPF prog-id=169 op=UNLOAD May 15 10:22:16.961000 audit: BPF prog-id=168 op=UNLOAD May 15 10:22:16.961000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.961000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.961000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.961000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.961000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.961000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.961000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.961000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.961000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.961000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:16.961000 audit: BPF prog-id=170 op=LOAD May 15 10:22:16.961000 audit[4349]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4341 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132613639613731343733386162613337323634663732333664613836 May 15 10:22:17.008434 env[1217]: time="2025-05-15T10:22:17.008393603Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2lh5x,Uid:ef184343-07cc-49e8-9335-04743ecda65a,Namespace:calico-system,Attempt:1,} returns sandbox id \"a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce\"" May 15 10:22:17.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit: BPF prog-id=171 op=LOAD May 15 10:22:17.026000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=4281 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:17.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536663438346466336434643633366562616630646364643430663638 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=4281 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:17.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536663438346466336434643633366562616630646364643430663638 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit: BPF prog-id=172 op=LOAD May 15 10:22:17.026000 audit[4429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=4281 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:17.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536663438346466336434643633366562616630646364643430663638 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit: BPF prog-id=173 op=LOAD May 15 10:22:17.026000 audit[4429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=4281 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:17.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536663438346466336434643633366562616630646364643430663638 May 15 10:22:17.026000 audit: BPF prog-id=173 op=UNLOAD May 15 10:22:17.026000 audit: BPF prog-id=172 op=UNLOAD May 15 10:22:17.026000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.026000 audit: BPF prog-id=174 op=LOAD May 15 10:22:17.026000 audit[4429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=4281 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:17.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536663438346466336434643633366562616630646364643430663638 May 15 10:22:17.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.027000 audit: BPF prog-id=175 op=LOAD May 15 10:22:17.027000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.027000 audit[4382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4235 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:17.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623865386564316138326337343939326339303931353138313230 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4235 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:17.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623865386564316138326337343939326339303931353138313230 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit: BPF prog-id=176 op=LOAD May 15 10:22:17.028000 audit[4382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4235 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:17.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623865386564316138326337343939326339303931353138313230 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit: BPF prog-id=177 op=LOAD May 15 10:22:17.028000 audit[4382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4235 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:17.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623865386564316138326337343939326339303931353138313230 May 15 10:22:17.028000 audit: BPF prog-id=177 op=UNLOAD May 15 10:22:17.028000 audit: BPF prog-id=176 op=UNLOAD May 15 10:22:17.028000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:17.028000 audit: BPF prog-id=178 op=LOAD May 15 10:22:17.028000 audit[4382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4235 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:17.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623865386564316138326337343939326339303931353138313230 May 15 10:22:17.062732 env[1217]: time="2025-05-15T10:22:17.062687467Z" level=info msg="StartContainer for \"56f484df3d4d636ebaf0dcdd40f68f72235249d74ce4cc75e95abdb073bc0d1f\" returns successfully" May 15 10:22:17.063467 env[1217]: time="2025-05-15T10:22:17.063428822Z" level=info msg="StartContainer for \"a4b8e8ed1a82c74992c90915181206ef5ffe94557e429fd280c8236db60b1a74\" returns successfully" May 15 10:22:17.286443 kubelet[2061]: E0515 10:22:17.286351 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:17.290297 kubelet[2061]: I0515 10:22:17.290268 2061 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:22:17.290760 kubelet[2061]: E0515 10:22:17.290742 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:17.298559 kubelet[2061]: I0515 10:22:17.298476 2061 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-tvb89" podStartSLOduration=32.298456647 podStartE2EDuration="32.298456647s" podCreationTimestamp="2025-05-15 10:21:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:22:17.298429167 +0000 UTC m=+46.263816035" watchObservedRunningTime="2025-05-15 10:22:17.298456647 +0000 UTC m=+46.263843515" May 15 10:22:17.320962 kubelet[2061]: I0515 10:22:17.320898 2061 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-59vhs" podStartSLOduration=32.320872308 podStartE2EDuration="32.320872308s" podCreationTimestamp="2025-05-15 10:21:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:22:17.320765989 +0000 UTC m=+46.286152817" watchObservedRunningTime="2025-05-15 10:22:17.320872308 +0000 UTC m=+46.286259136" May 15 10:22:17.422000 audit[4487]: NETFILTER_CFG table=filter:99 family=2 entries=15 op=nft_register_rule pid=4487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:17.422000 audit[4487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4420 a0=3 a1=fffff145df80 a2=0 a3=1 items=0 ppid=2262 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:17.422000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:17.429000 audit[4487]: NETFILTER_CFG table=nat:100 family=2 entries=33 op=nft_register_chain pid=4487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:17.429000 audit[4487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13428 a0=3 a1=fffff145df80 a2=0 a3=1 items=0 ppid=2262 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:17.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:17.463000 audit[3909]: AVC avc: denied { watch } for pid=3909 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_22_00.1820817936/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c763 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c359,c763 tclass=file permissive=0 May 15 10:22:17.463000 audit[3909]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000a331a0 a2=fc6 a3=0 items=0 ppid=3786 pid=3909 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c763 key=(null) May 15 10:22:17.463000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:22:17.563131 systemd[1]: Started sshd@12-10.0.0.103:22-10.0.0.1:45942.service. May 15 10:22:17.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.103:22-10.0.0.1:45942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:17.614000 audit[4493]: USER_ACCT pid=4493 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:17.616102 sshd[4493]: Accepted publickey for core from 10.0.0.1 port 45942 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:22:17.615000 audit[4493]: CRED_ACQ pid=4493 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:17.615000 audit[4493]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea77ea10 a2=3 a3=1 items=0 ppid=1 pid=4493 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:17.615000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:22:17.617609 sshd[4493]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:22:17.621261 systemd-logind[1203]: New session 13 of user core. May 15 10:22:17.622140 systemd[1]: Started session-13.scope. May 15 10:22:17.624000 audit[4493]: USER_START pid=4493 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:17.625000 audit[4495]: CRED_ACQ pid=4495 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:17.786311 systemd-networkd[1043]: cali2da053663fd: Gained IPv6LL May 15 10:22:17.799018 sshd[4493]: pam_unix(sshd:session): session closed for user core May 15 10:22:17.798000 audit[4493]: USER_END pid=4493 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:17.798000 audit[4493]: CRED_DISP pid=4493 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:17.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.103:22-10.0.0.1:45942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:17.801482 systemd[1]: sshd@12-10.0.0.103:22-10.0.0.1:45942.service: Deactivated successfully. May 15 10:22:17.802230 systemd[1]: session-13.scope: Deactivated successfully. May 15 10:22:17.802729 systemd-logind[1203]: Session 13 logged out. Waiting for processes to exit. May 15 10:22:17.803368 systemd-logind[1203]: Removed session 13. May 15 10:22:17.849285 systemd-networkd[1043]: cali39fc51fd850: Gained IPv6LL May 15 10:22:17.849529 systemd-networkd[1043]: calida3546e7ce4: Gained IPv6LL May 15 10:22:18.106282 systemd-networkd[1043]: caliaee07c7a74e: Gained IPv6LL May 15 10:22:18.293795 kubelet[2061]: E0515 10:22:18.292692 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:18.293795 kubelet[2061]: E0515 10:22:18.293435 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:18.455000 audit[4532]: NETFILTER_CFG table=filter:101 family=2 entries=11 op=nft_register_rule pid=4532 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:18.455000 audit[4532]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffdd0eb660 a2=0 a3=1 items=0 ppid=2262 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:18.455000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:18.466000 audit[4532]: NETFILTER_CFG table=nat:102 family=2 entries=61 op=nft_register_chain pid=4532 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:18.466000 audit[4532]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22668 a0=3 a1=ffffdd0eb660 a2=0 a3=1 items=0 ppid=2262 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:18.466000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:18.880647 env[1217]: time="2025-05-15T10:22:18.880583320Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:18.882675 env[1217]: time="2025-05-15T10:22:18.882641508Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:18.888134 env[1217]: time="2025-05-15T10:22:18.888082914Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:18.890017 env[1217]: time="2025-05-15T10:22:18.889979303Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:18.890526 env[1217]: time="2025-05-15T10:22:18.890490820Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814\"" May 15 10:22:18.892109 env[1217]: time="2025-05-15T10:22:18.892081890Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 10:22:18.903985 env[1217]: time="2025-05-15T10:22:18.903935378Z" level=info msg="CreateContainer within sandbox \"dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 15 10:22:18.960733 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3076788877.mount: Deactivated successfully. May 15 10:22:19.019500 env[1217]: time="2025-05-15T10:22:19.019452359Z" level=info msg="CreateContainer within sandbox \"dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"34b1b96cfa25051f94a082103631caff2d60da950ae8225f7d309d4d4b30749d\"" May 15 10:22:19.020002 env[1217]: time="2025-05-15T10:22:19.019966116Z" level=info msg="StartContainer for \"34b1b96cfa25051f94a082103631caff2d60da950ae8225f7d309d4d4b30749d\"" May 15 10:22:19.038070 systemd[1]: Started cri-containerd-34b1b96cfa25051f94a082103631caff2d60da950ae8225f7d309d4d4b30749d.scope. May 15 10:22:19.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.077000 audit: BPF prog-id=179 op=LOAD May 15 10:22:19.077000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.077000 audit[4545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4189 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623162393663666132353035316639346130383231303336333163 May 15 10:22:19.078000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.078000 audit[4545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4189 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623162393663666132353035316639346130383231303336333163 May 15 10:22:19.078000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.078000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.078000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.078000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.078000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.078000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.078000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.078000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.078000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.078000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.078000 audit: BPF prog-id=180 op=LOAD May 15 10:22:19.078000 audit[4545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4189 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623162393663666132353035316639346130383231303336333163 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit: BPF prog-id=181 op=LOAD May 15 10:22:19.079000 audit[4545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4189 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623162393663666132353035316639346130383231303336333163 May 15 10:22:19.079000 audit: BPF prog-id=181 op=UNLOAD May 15 10:22:19.079000 audit: BPF prog-id=180 op=UNLOAD May 15 10:22:19.079000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.079000 audit: BPF prog-id=182 op=LOAD May 15 10:22:19.079000 audit[4545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4189 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623162393663666132353035316639346130383231303336333163 May 15 10:22:19.102607 env[1217]: time="2025-05-15T10:22:19.102554945Z" level=info msg="StartContainer for \"34b1b96cfa25051f94a082103631caff2d60da950ae8225f7d309d4d4b30749d\" returns successfully" May 15 10:22:19.246880 kubelet[2061]: I0515 10:22:19.246764 2061 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:22:19.247454 kubelet[2061]: E0515 10:22:19.247430 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:19.295992 kubelet[2061]: E0515 10:22:19.295962 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:19.296833 kubelet[2061]: E0515 10:22:19.296654 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:19.306217 kubelet[2061]: I0515 10:22:19.306154 2061 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-74bdffb748-sc7rm" podStartSLOduration=25.217555501 podStartE2EDuration="27.306141653s" podCreationTimestamp="2025-05-15 10:21:52 +0000 UTC" firstStartedPulling="2025-05-15 10:22:16.803330939 +0000 UTC m=+45.768717807" lastFinishedPulling="2025-05-15 10:22:18.891917091 +0000 UTC m=+47.857303959" observedRunningTime="2025-05-15 10:22:19.305572176 +0000 UTC m=+48.270959004" watchObservedRunningTime="2025-05-15 10:22:19.306141653 +0000 UTC m=+48.271528521" May 15 10:22:19.483000 audit[4600]: NETFILTER_CFG table=filter:103 family=2 entries=9 op=nft_register_rule pid=4600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:19.483000 audit[4600]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffb802e80 a2=0 a3=1 items=0 ppid=2262 pid=4600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:19.495000 audit[4600]: NETFILTER_CFG table=nat:104 family=2 entries=27 op=nft_register_chain pid=4600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:19.495000 audit[4600]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=fffffb802e80 a2=0 a3=1 items=0 ppid=2262 pid=4600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.495000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:19.872067 env[1217]: time="2025-05-15T10:22:19.872023484Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:19.873962 env[1217]: time="2025-05-15T10:22:19.873922953Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:19.875694 env[1217]: time="2025-05-15T10:22:19.875668663Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:19.877022 env[1217]: time="2025-05-15T10:22:19.876988895Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:19.877446 env[1217]: time="2025-05-15T10:22:19.877421212Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b\"" May 15 10:22:19.879826 env[1217]: time="2025-05-15T10:22:19.879787358Z" level=info msg="CreateContainer within sandbox \"a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 10:22:19.900533 env[1217]: time="2025-05-15T10:22:19.900490795Z" level=info msg="CreateContainer within sandbox \"a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"4bdfb126475bed52c8e1de7c8a2dd45728753adc84745214323f75e3410e4a2b\"" May 15 10:22:19.901539 env[1217]: time="2025-05-15T10:22:19.901503389Z" level=info msg="StartContainer for \"4bdfb126475bed52c8e1de7c8a2dd45728753adc84745214323f75e3410e4a2b\"" May 15 10:22:19.924694 systemd[1]: Started cri-containerd-4bdfb126475bed52c8e1de7c8a2dd45728753adc84745214323f75e3410e4a2b.scope. May 15 10:22:19.963000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4341 pid=4619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462646662313236343735626564353263386531646537633861326464 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit: BPF prog-id=183 op=LOAD May 15 10:22:19.963000 audit[4619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4341 pid=4619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462646662313236343735626564353263386531646537633861326464 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit: BPF prog-id=184 op=LOAD May 15 10:22:19.963000 audit[4619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4341 pid=4619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462646662313236343735626564353263386531646537633861326464 May 15 10:22:19.963000 audit: BPF prog-id=184 op=UNLOAD May 15 10:22:19.963000 audit: BPF prog-id=183 op=UNLOAD May 15 10:22:19.963000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { perfmon } for pid=4619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit[4619]: AVC avc: denied { bpf } for pid=4619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.963000 audit: BPF prog-id=185 op=LOAD May 15 10:22:19.963000 audit[4619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4341 pid=4619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462646662313236343735626564353263386531646537633861326464 May 15 10:22:20.021785 env[1217]: time="2025-05-15T10:22:20.021730356Z" level=info msg="StartContainer for \"4bdfb126475bed52c8e1de7c8a2dd45728753adc84745214323f75e3410e4a2b\" returns successfully" May 15 10:22:20.023722 env[1217]: time="2025-05-15T10:22:20.023683944Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 10:22:20.034000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.034000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.034000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.034000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.034000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.034000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.034000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.034000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.034000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.034000 audit: BPF prog-id=186 op=LOAD May 15 10:22:20.034000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd854d1c8 a2=98 a3=ffffd854d1b8 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.035000 audit: BPF prog-id=186 op=UNLOAD May 15 10:22:20.035000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit: BPF prog-id=187 op=LOAD May 15 10:22:20.035000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd854ce58 a2=74 a3=95 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.035000 audit: BPF prog-id=187 op=UNLOAD May 15 10:22:20.035000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.035000 audit: BPF prog-id=188 op=LOAD May 15 10:22:20.035000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd854ceb8 a2=94 a3=2 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.035000 audit: BPF prog-id=188 op=UNLOAD May 15 10:22:20.119000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit: BPF prog-id=189 op=LOAD May 15 10:22:20.119000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd854ce78 a2=40 a3=ffffd854cea8 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.119000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.120000 audit: BPF prog-id=189 op=UNLOAD May 15 10:22:20.120000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.120000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd854cf90 a2=50 a3=0 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.120000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.128000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd854cee8 a2=28 a3=ffffd854d018 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.128000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.128000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd854cf18 a2=28 a3=ffffd854d048 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.128000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.128000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd854cdc8 a2=28 a3=ffffd854cef8 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.128000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.128000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd854cf38 a2=28 a3=ffffd854d068 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.128000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.128000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd854cf18 a2=28 a3=ffffd854d048 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.128000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.128000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd854cf08 a2=28 a3=ffffd854d038 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.128000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.128000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd854cf38 a2=28 a3=ffffd854d068 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.128000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.128000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd854cf18 a2=28 a3=ffffd854d048 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.128000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.128000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd854cf38 a2=28 a3=ffffd854d068 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.128000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.128000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd854cf08 a2=28 a3=ffffd854d038 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.128000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.128000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd854cf88 a2=28 a3=ffffd854d0c8 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.128000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.128000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd854ccc0 a2=50 a3=0 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.128000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.128000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.128000 audit: BPF prog-id=190 op=LOAD May 15 10:22:20.128000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd854ccc8 a2=94 a3=5 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.128000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.129000 audit: BPF prog-id=190 op=UNLOAD May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd854cdd0 a2=50 a3=0 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.129000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.129000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd854cf18 a2=4 a3=3 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.129000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.129000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { confidentiality } for pid=4656 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:20.129000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd854cef8 a2=94 a3=6 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.129000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.129000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { confidentiality } for pid=4656 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:20.129000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd854c6c8 a2=94 a3=83 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.129000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.129000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { perfmon } for pid=4656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { bpf } for pid=4656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.129000 audit[4656]: AVC avc: denied { confidentiality } for pid=4656 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:20.129000 audit[4656]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd854c6c8 a2=94 a3=83 items=0 ppid=4602 pid=4656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.129000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.141000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit: BPF prog-id=191 op=LOAD May 15 10:22:20.141000 audit[4665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe0358428 a2=98 a3=ffffe0358418 items=0 ppid=4602 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.141000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:22:20.141000 audit: BPF prog-id=191 op=UNLOAD May 15 10:22:20.141000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.141000 audit: BPF prog-id=192 op=LOAD May 15 10:22:20.141000 audit[4665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe03582d8 a2=74 a3=95 items=0 ppid=4602 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.141000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:22:20.142000 audit: BPF prog-id=192 op=UNLOAD May 15 10:22:20.142000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.142000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.142000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.142000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.142000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.142000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.142000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.142000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.142000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.142000 audit: BPF prog-id=193 op=LOAD May 15 10:22:20.142000 audit[4665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe0358308 a2=40 a3=ffffe0358338 items=0 ppid=4602 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.142000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:22:20.142000 audit: BPF prog-id=193 op=UNLOAD May 15 10:22:20.207217 systemd-networkd[1043]: vxlan.calico: Link UP May 15 10:22:20.207224 systemd-networkd[1043]: vxlan.calico: Gained carrier May 15 10:22:20.256000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.256000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.256000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.256000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.256000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.256000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.256000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.256000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.256000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.256000 audit: BPF prog-id=194 op=LOAD May 15 10:22:20.256000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc018aab8 a2=98 a3=ffffc018aaa8 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.256000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.257000 audit: BPF prog-id=194 op=UNLOAD May 15 10:22:20.259000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.259000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.259000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.259000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.259000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.259000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.259000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.259000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.259000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.259000 audit: BPF prog-id=195 op=LOAD May 15 10:22:20.259000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc018a798 a2=74 a3=95 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.259000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.260000 audit: BPF prog-id=195 op=UNLOAD May 15 10:22:20.260000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.260000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.260000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.260000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.260000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.260000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.260000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.260000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.260000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.260000 audit: BPF prog-id=196 op=LOAD May 15 10:22:20.260000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc018a7f8 a2=94 a3=2 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.260000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.260000 audit: BPF prog-id=196 op=UNLOAD May 15 10:22:20.260000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.260000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc018a828 a2=28 a3=ffffc018a958 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.260000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.260000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.260000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc018a858 a2=28 a3=ffffc018a988 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.260000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.261000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.261000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc018a708 a2=28 a3=ffffc018a838 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.261000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.261000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.261000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc018a878 a2=28 a3=ffffc018a9a8 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.261000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.261000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.261000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc018a858 a2=28 a3=ffffc018a988 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.261000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.261000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.261000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc018a848 a2=28 a3=ffffc018a978 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.261000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.261000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.261000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc018a878 a2=28 a3=ffffc018a9a8 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.261000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.262000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.262000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc018a858 a2=28 a3=ffffc018a988 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.262000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.262000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.262000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc018a878 a2=28 a3=ffffc018a9a8 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.262000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.262000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.262000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc018a848 a2=28 a3=ffffc018a978 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.262000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.262000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.262000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc018a8c8 a2=28 a3=ffffc018aa08 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.262000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.262000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.262000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.262000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.262000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.262000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.262000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.262000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.262000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.262000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.262000 audit: BPF prog-id=197 op=LOAD May 15 10:22:20.262000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc018a6e8 a2=40 a3=ffffc018a718 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.262000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.263000 audit: BPF prog-id=197 op=UNLOAD May 15 10:22:20.265000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.265000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffc018a710 a2=50 a3=0 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.265000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.265000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.265000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffc018a710 a2=50 a3=0 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.265000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.265000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.265000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.265000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.265000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.265000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.265000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.265000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.265000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.265000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.265000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.265000 audit: BPF prog-id=198 op=LOAD May 15 10:22:20.265000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc0189e78 a2=94 a3=2 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.265000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.266000 audit: BPF prog-id=198 op=UNLOAD May 15 10:22:20.266000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.266000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.266000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.266000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.266000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.266000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.266000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.266000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.266000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.266000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.266000 audit: BPF prog-id=199 op=LOAD May 15 10:22:20.266000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc018a008 a2=94 a3=30 items=0 ppid=4602 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.286000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.286000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.286000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.286000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.286000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.286000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.286000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.286000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.286000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.286000 audit: BPF prog-id=200 op=LOAD May 15 10:22:20.286000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffef6eb918 a2=98 a3=ffffef6eb908 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.286000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.286000 audit: BPF prog-id=200 op=UNLOAD May 15 10:22:20.287000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit: BPF prog-id=201 op=LOAD May 15 10:22:20.287000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffef6eb5a8 a2=74 a3=95 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.287000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.287000 audit: BPF prog-id=201 op=UNLOAD May 15 10:22:20.287000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.287000 audit: BPF prog-id=202 op=LOAD May 15 10:22:20.287000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffef6eb608 a2=94 a3=2 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.287000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.288000 audit: BPF prog-id=202 op=UNLOAD May 15 10:22:20.299334 kubelet[2061]: I0515 10:22:20.299298 2061 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:22:20.300259 kubelet[2061]: E0515 10:22:20.300236 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:20.383000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.383000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.383000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.383000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.383000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.383000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.383000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.383000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.383000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.383000 audit: BPF prog-id=203 op=LOAD May 15 10:22:20.383000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffef6eb5c8 a2=40 a3=ffffef6eb5f8 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.383000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.384000 audit: BPF prog-id=203 op=UNLOAD May 15 10:22:20.384000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.384000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffef6eb6e0 a2=50 a3=0 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.384000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.395000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.395000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffef6eb638 a2=28 a3=ffffef6eb768 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.395000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.395000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.395000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffef6eb668 a2=28 a3=ffffef6eb798 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.395000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.395000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.395000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffef6eb518 a2=28 a3=ffffef6eb648 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.395000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.395000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.395000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffef6eb688 a2=28 a3=ffffef6eb7b8 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.395000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.396000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.396000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffef6eb668 a2=28 a3=ffffef6eb798 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.396000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.396000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffef6eb658 a2=28 a3=ffffef6eb788 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.396000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.396000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffef6eb688 a2=28 a3=ffffef6eb7b8 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.396000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.396000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffef6eb668 a2=28 a3=ffffef6eb798 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.396000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.396000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffef6eb688 a2=28 a3=ffffef6eb7b8 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.396000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.396000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffef6eb658 a2=28 a3=ffffef6eb788 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.397000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.397000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffef6eb6d8 a2=28 a3=ffffef6eb818 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.397000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.397000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffef6eb410 a2=50 a3=0 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.397000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.397000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.397000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.397000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.397000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.397000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.397000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.397000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.397000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.397000 audit: BPF prog-id=204 op=LOAD May 15 10:22:20.397000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffef6eb418 a2=94 a3=5 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.398000 audit: BPF prog-id=204 op=UNLOAD May 15 10:22:20.398000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.398000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffef6eb520 a2=50 a3=0 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.398000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.398000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffef6eb668 a2=4 a3=3 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.398000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.398000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.398000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.398000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.398000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.398000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.398000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.398000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.398000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.398000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.398000 audit[4718]: AVC avc: denied { confidentiality } for pid=4718 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:20.398000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffef6eb648 a2=94 a3=6 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { confidentiality } for pid=4718 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:20.399000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffef6eae18 a2=94 a3=83 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.399000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.399000 audit[4718]: AVC avc: denied { confidentiality } for pid=4718 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:20.399000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffef6eae18 a2=94 a3=83 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.399000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.400000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.400000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffef6ec858 a2=10 a3=ffffef6ec948 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.400000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.401000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.401000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffef6ec718 a2=10 a3=ffffef6ec808 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.401000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.401000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.401000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffef6ec688 a2=10 a3=ffffef6ec808 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.401000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.401000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.401000 audit[4718]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffef6ec688 a2=10 a3=ffffef6ec808 items=0 ppid=4602 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.401000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.412000 audit: BPF prog-id=199 op=UNLOAD May 15 10:22:20.500000 audit[4805]: NETFILTER_CFG table=mangle:105 family=2 entries=16 op=nft_register_chain pid=4805 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:22:20.500000 audit[4805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffd92911b0 a2=0 a3=ffffa7bf2fa8 items=0 ppid=4602 pid=4805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.500000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:22:20.508000 audit[4803]: NETFILTER_CFG table=nat:106 family=2 entries=15 op=nft_register_chain pid=4803 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:22:20.508000 audit[4803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffff0cbc530 a2=0 a3=ffff8fdcdfa8 items=0 ppid=4602 pid=4803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.508000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:22:20.509000 audit[4806]: NETFILTER_CFG table=filter:107 family=2 entries=215 op=nft_register_chain pid=4806 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:22:20.509000 audit[4806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=125772 a0=3 a1=fffff2d7d9a0 a2=0 a3=ffffabc17fa8 items=0 ppid=4602 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.509000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:22:20.512000 audit[4804]: NETFILTER_CFG table=raw:108 family=2 entries=21 op=nft_register_chain pid=4804 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:22:20.512000 audit[4804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffdba994e0 a2=0 a3=ffff9a02cfa8 items=0 ppid=4602 pid=4804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.512000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:22:21.162531 env[1217]: time="2025-05-15T10:22:21.162476985Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:21.163804 env[1217]: time="2025-05-15T10:22:21.163772378Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:21.165558 env[1217]: time="2025-05-15T10:22:21.165534728Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:21.167002 env[1217]: time="2025-05-15T10:22:21.166654641Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:21.167255 env[1217]: time="2025-05-15T10:22:21.167226718Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc\"" May 15 10:22:21.169300 env[1217]: time="2025-05-15T10:22:21.169269426Z" level=info msg="CreateContainer within sandbox \"a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 10:22:21.181355 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2221176052.mount: Deactivated successfully. May 15 10:22:21.183355 env[1217]: time="2025-05-15T10:22:21.183303786Z" level=info msg="CreateContainer within sandbox \"a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"66a1849e1ec7305cd4488616e688b28b52809a928b6be847c8bc5fc2ae5f91c6\"" May 15 10:22:21.184418 env[1217]: time="2025-05-15T10:22:21.184392019Z" level=info msg="StartContainer for \"66a1849e1ec7305cd4488616e688b28b52809a928b6be847c8bc5fc2ae5f91c6\"" May 15 10:22:21.203315 systemd[1]: Started cri-containerd-66a1849e1ec7305cd4488616e688b28b52809a928b6be847c8bc5fc2ae5f91c6.scope. May 15 10:22:21.233000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4341 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:21.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636613138343965316563373330356364343438383631366536383862 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit: BPF prog-id=205 op=LOAD May 15 10:22:21.233000 audit[4830]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4341 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:21.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636613138343965316563373330356364343438383631366536383862 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit: BPF prog-id=206 op=LOAD May 15 10:22:21.233000 audit[4830]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4341 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:21.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636613138343965316563373330356364343438383631366536383862 May 15 10:22:21.233000 audit: BPF prog-id=206 op=UNLOAD May 15 10:22:21.233000 audit: BPF prog-id=205 op=UNLOAD May 15 10:22:21.233000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:21.233000 audit: BPF prog-id=207 op=LOAD May 15 10:22:21.233000 audit[4830]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4341 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:21.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636613138343965316563373330356364343438383631366536383862 May 15 10:22:21.247435 env[1217]: time="2025-05-15T10:22:21.247391178Z" level=info msg="StartContainer for \"66a1849e1ec7305cd4488616e688b28b52809a928b6be847c8bc5fc2ae5f91c6\" returns successfully" May 15 10:22:21.899298 systemd[1]: run-containerd-runc-k8s.io-66a1849e1ec7305cd4488616e688b28b52809a928b6be847c8bc5fc2ae5f91c6-runc.0INs1W.mount: Deactivated successfully. May 15 10:22:21.945301 systemd-networkd[1043]: vxlan.calico: Gained IPv6LL May 15 10:22:22.234622 kubelet[2061]: I0515 10:22:22.234522 2061 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 10:22:22.236453 kubelet[2061]: I0515 10:22:22.236427 2061 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 10:22:22.804153 systemd[1]: Started sshd@13-10.0.0.103:22-10.0.0.1:43974.service. May 15 10:22:22.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.103:22-10.0.0.1:43974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:22.805508 kernel: kauditd_printk_skb: 816 callbacks suppressed May 15 10:22:22.805583 kernel: audit: type=1130 audit(1747304542.803:1396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.103:22-10.0.0.1:43974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:22.849000 audit[4866]: USER_ACCT pid=4866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:22.851056 sshd[4866]: Accepted publickey for core from 10.0.0.1 port 43974 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:22:22.852962 sshd[4866]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:22:22.852000 audit[4866]: CRED_ACQ pid=4866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:22.857036 systemd-logind[1203]: New session 14 of user core. May 15 10:22:22.857476 systemd[1]: Started session-14.scope. May 15 10:22:22.860989 kernel: audit: type=1101 audit(1747304542.849:1397): pid=4866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:22.861415 kernel: audit: type=1103 audit(1747304542.852:1398): pid=4866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:22.861451 kernel: audit: type=1006 audit(1747304542.852:1399): pid=4866 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 15 10:22:22.852000 audit[4866]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd786bb70 a2=3 a3=1 items=0 ppid=1 pid=4866 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:22.867764 kernel: audit: type=1300 audit(1747304542.852:1399): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd786bb70 a2=3 a3=1 items=0 ppid=1 pid=4866 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:22.867845 kernel: audit: type=1327 audit(1747304542.852:1399): proctitle=737368643A20636F7265205B707269765D May 15 10:22:22.852000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:22:22.862000 audit[4866]: USER_START pid=4866 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:22.872943 kernel: audit: type=1105 audit(1747304542.862:1400): pid=4866 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:22.873006 kernel: audit: type=1103 audit(1747304542.863:1401): pid=4868 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:22.863000 audit[4868]: CRED_ACQ pid=4868 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:23.025834 sshd[4866]: pam_unix(sshd:session): session closed for user core May 15 10:22:23.025000 audit[4866]: USER_END pid=4866 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:23.028568 systemd[1]: session-14.scope: Deactivated successfully. May 15 10:22:23.029295 systemd-logind[1203]: Session 14 logged out. Waiting for processes to exit. May 15 10:22:23.029449 systemd[1]: sshd@13-10.0.0.103:22-10.0.0.1:43974.service: Deactivated successfully. May 15 10:22:23.030566 systemd-logind[1203]: Removed session 14. May 15 10:22:23.026000 audit[4866]: CRED_DISP pid=4866 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:23.033795 kernel: audit: type=1106 audit(1747304543.025:1402): pid=4866 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:23.033851 kernel: audit: type=1104 audit(1747304543.026:1403): pid=4866 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:23.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.103:22-10.0.0.1:43974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:26.863415 kubelet[2061]: I0515 10:22:26.863355 2061 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:22:26.893768 kubelet[2061]: I0515 10:22:26.893693 2061 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-2lh5x" podStartSLOduration=30.735275266 podStartE2EDuration="34.893669583s" podCreationTimestamp="2025-05-15 10:21:52 +0000 UTC" firstStartedPulling="2025-05-15 10:22:17.009602876 +0000 UTC m=+45.974989704" lastFinishedPulling="2025-05-15 10:22:21.167997153 +0000 UTC m=+50.133384021" observedRunningTime="2025-05-15 10:22:21.320438638 +0000 UTC m=+50.285825506" watchObservedRunningTime="2025-05-15 10:22:26.893669583 +0000 UTC m=+55.859056451" May 15 10:22:26.912000 audit[4887]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4887 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:26.912000 audit[4887]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff11d6d10 a2=0 a3=1 items=0 ppid=2262 pid=4887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.912000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:26.924000 audit[4887]: NETFILTER_CFG table=nat:110 family=2 entries=34 op=nft_register_chain pid=4887 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:26.924000 audit[4887]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff11d6d10 a2=0 a3=1 items=0 ppid=2262 pid=4887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.924000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:28.031041 systemd[1]: Started sshd@14-10.0.0.103:22-10.0.0.1:43984.service. May 15 10:22:28.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.103:22-10.0.0.1:43984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:28.034985 kernel: kauditd_printk_skb: 7 callbacks suppressed May 15 10:22:28.035064 kernel: audit: type=1130 audit(1747304548.031:1407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.103:22-10.0.0.1:43984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:28.069000 audit[4889]: USER_ACCT pid=4889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:28.069854 sshd[4889]: Accepted publickey for core from 10.0.0.1 port 43984 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:22:28.071676 sshd[4889]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:22:28.071000 audit[4889]: CRED_ACQ pid=4889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:28.076603 kernel: audit: type=1101 audit(1747304548.069:1408): pid=4889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:28.076711 kernel: audit: type=1103 audit(1747304548.071:1409): pid=4889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:28.076735 kernel: audit: type=1006 audit(1747304548.071:1410): pid=4889 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 15 10:22:28.076243 systemd[1]: Started session-15.scope. May 15 10:22:28.076397 systemd-logind[1203]: New session 15 of user core. May 15 10:22:28.071000 audit[4889]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3e9ad30 a2=3 a3=1 items=0 ppid=1 pid=4889 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:28.082003 kernel: audit: type=1300 audit(1747304548.071:1410): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3e9ad30 a2=3 a3=1 items=0 ppid=1 pid=4889 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:28.082064 kernel: audit: type=1327 audit(1747304548.071:1410): proctitle=737368643A20636F7265205B707269765D May 15 10:22:28.071000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:22:28.080000 audit[4889]: USER_START pid=4889 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:28.086538 kernel: audit: type=1105 audit(1747304548.080:1411): pid=4889 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:28.086610 kernel: audit: type=1103 audit(1747304548.082:1412): pid=4891 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:28.082000 audit[4891]: CRED_ACQ pid=4891 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:28.199893 sshd[4889]: pam_unix(sshd:session): session closed for user core May 15 10:22:28.200000 audit[4889]: USER_END pid=4889 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:28.202690 systemd[1]: sshd@14-10.0.0.103:22-10.0.0.1:43984.service: Deactivated successfully. May 15 10:22:28.203468 systemd[1]: session-15.scope: Deactivated successfully. May 15 10:22:28.203936 systemd-logind[1203]: Session 15 logged out. Waiting for processes to exit. May 15 10:22:28.204528 systemd-logind[1203]: Removed session 15. May 15 10:22:28.200000 audit[4889]: CRED_DISP pid=4889 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:28.208286 kernel: audit: type=1106 audit(1747304548.200:1413): pid=4889 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:28.208320 kernel: audit: type=1104 audit(1747304548.200:1414): pid=4889 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:28.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.103:22-10.0.0.1:43984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:28.295000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:22:28.295000 audit[1946]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400065cc60 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:22:28.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:22:28.295000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:22:28.295000 audit[1946]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000b42000 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:22:28.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:22:28.329000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:22:28.329000 audit[1937]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=400a357710 a2=fc6 a3=0 items=0 ppid=1769 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 key=(null) May 15 10:22:28.329000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:22:28.329000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:22:28.329000 audit[1937]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=78 a1=400a892360 a2=fc6 a3=0 items=0 ppid=1769 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 key=(null) May 15 10:22:28.329000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:22:28.331000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:22:28.331000 audit[1937]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=40099a9d70 a2=fc6 a3=0 items=0 ppid=1769 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 key=(null) May 15 10:22:28.331000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:22:28.344000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:22:28.344000 audit[1937]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=400805fd80 a2=fc6 a3=0 items=0 ppid=1769 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 key=(null) May 15 10:22:28.344000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:22:28.355000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:22:28.355000 audit[1937]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=78 a1=400a892390 a2=fc6 a3=0 items=0 ppid=1769 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 key=(null) May 15 10:22:28.355000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:22:28.355000 audit[1937]: AVC avc: denied { watch } for pid=1937 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:22:28.355000 audit[1937]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=4009541640 a2=fc6 a3=0 items=0 ppid=1769 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c535 key=(null) May 15 10:22:28.355000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:22:31.103507 env[1217]: time="2025-05-15T10:22:31.103130658Z" level=info msg="StopPodSandbox for \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\"" May 15 10:22:31.215212 env[1217]: 2025-05-15 10:22:31.165 [WARNING][4925] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"7053c2cf-5dbb-4d82-8c91-e2174a115431", ResourceVersion:"937", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f", Pod:"coredns-7db6d8ff4d-tvb89", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali39fc51fd850", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:31.215212 env[1217]: 2025-05-15 10:22:31.166 [INFO][4925] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" May 15 10:22:31.215212 env[1217]: 2025-05-15 10:22:31.166 [INFO][4925] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" iface="eth0" netns="" May 15 10:22:31.215212 env[1217]: 2025-05-15 10:22:31.166 [INFO][4925] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" May 15 10:22:31.215212 env[1217]: 2025-05-15 10:22:31.166 [INFO][4925] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" May 15 10:22:31.215212 env[1217]: 2025-05-15 10:22:31.200 [INFO][4936] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" HandleID="k8s-pod-network.efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" Workload="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" May 15 10:22:31.215212 env[1217]: 2025-05-15 10:22:31.200 [INFO][4936] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:31.215212 env[1217]: 2025-05-15 10:22:31.200 [INFO][4936] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:31.215212 env[1217]: 2025-05-15 10:22:31.210 [WARNING][4936] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" HandleID="k8s-pod-network.efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" Workload="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" May 15 10:22:31.215212 env[1217]: 2025-05-15 10:22:31.210 [INFO][4936] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" HandleID="k8s-pod-network.efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" Workload="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" May 15 10:22:31.215212 env[1217]: 2025-05-15 10:22:31.211 [INFO][4936] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:31.215212 env[1217]: 2025-05-15 10:22:31.213 [INFO][4925] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" May 15 10:22:31.215668 env[1217]: time="2025-05-15T10:22:31.215237575Z" level=info msg="TearDown network for sandbox \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\" successfully" May 15 10:22:31.215668 env[1217]: time="2025-05-15T10:22:31.215264375Z" level=info msg="StopPodSandbox for \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\" returns successfully" May 15 10:22:31.215738 env[1217]: time="2025-05-15T10:22:31.215706053Z" level=info msg="RemovePodSandbox for \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\"" May 15 10:22:31.215774 env[1217]: time="2025-05-15T10:22:31.215742572Z" level=info msg="Forcibly stopping sandbox \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\"" May 15 10:22:31.296228 env[1217]: 2025-05-15 10:22:31.253 [WARNING][4959] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"7053c2cf-5dbb-4d82-8c91-e2174a115431", ResourceVersion:"937", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3f08a0e266dc3c5dc806047b42ea15aaaea289df36cf1c6e30c83f88c4faac8f", Pod:"coredns-7db6d8ff4d-tvb89", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali39fc51fd850", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:31.296228 env[1217]: 2025-05-15 10:22:31.254 [INFO][4959] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" May 15 10:22:31.296228 env[1217]: 2025-05-15 10:22:31.254 [INFO][4959] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" iface="eth0" netns="" May 15 10:22:31.296228 env[1217]: 2025-05-15 10:22:31.254 [INFO][4959] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" May 15 10:22:31.296228 env[1217]: 2025-05-15 10:22:31.254 [INFO][4959] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" May 15 10:22:31.296228 env[1217]: 2025-05-15 10:22:31.275 [INFO][4967] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" HandleID="k8s-pod-network.efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" Workload="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" May 15 10:22:31.296228 env[1217]: 2025-05-15 10:22:31.275 [INFO][4967] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:31.296228 env[1217]: 2025-05-15 10:22:31.275 [INFO][4967] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:31.296228 env[1217]: 2025-05-15 10:22:31.284 [WARNING][4967] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" HandleID="k8s-pod-network.efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" Workload="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" May 15 10:22:31.296228 env[1217]: 2025-05-15 10:22:31.284 [INFO][4967] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" HandleID="k8s-pod-network.efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" Workload="localhost-k8s-coredns--7db6d8ff4d--tvb89-eth0" May 15 10:22:31.296228 env[1217]: 2025-05-15 10:22:31.286 [INFO][4967] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:31.296228 env[1217]: 2025-05-15 10:22:31.291 [INFO][4959] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b" May 15 10:22:31.296228 env[1217]: time="2025-05-15T10:22:31.294328098Z" level=info msg="TearDown network for sandbox \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\" successfully" May 15 10:22:31.313053 env[1217]: time="2025-05-15T10:22:31.313006724Z" level=info msg="RemovePodSandbox \"efbc80f1447b09aee9c3fcff77863dc1dead93100fe6515e7a28bcecf281075b\" returns successfully" May 15 10:22:31.315678 env[1217]: time="2025-05-15T10:22:31.314375438Z" level=info msg="StopPodSandbox for \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\"" May 15 10:22:31.398327 env[1217]: 2025-05-15 10:22:31.355 [WARNING][4989] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0", GenerateName:"calico-apiserver-5c4847f848-", Namespace:"calico-apiserver", SelfLink:"", UID:"b79ed0d1-14ce-496a-97e8-22f5c01122ae", ResourceVersion:"945", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c4847f848", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43", Pod:"calico-apiserver-5c4847f848-xb28g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali29aa6264058", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:31.398327 env[1217]: 2025-05-15 10:22:31.356 [INFO][4989] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" May 15 10:22:31.398327 env[1217]: 2025-05-15 10:22:31.356 [INFO][4989] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" iface="eth0" netns="" May 15 10:22:31.398327 env[1217]: 2025-05-15 10:22:31.356 [INFO][4989] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" May 15 10:22:31.398327 env[1217]: 2025-05-15 10:22:31.356 [INFO][4989] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" May 15 10:22:31.398327 env[1217]: 2025-05-15 10:22:31.380 [INFO][4997] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" HandleID="k8s-pod-network.59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" Workload="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" May 15 10:22:31.398327 env[1217]: 2025-05-15 10:22:31.380 [INFO][4997] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:31.398327 env[1217]: 2025-05-15 10:22:31.380 [INFO][4997] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:31.398327 env[1217]: 2025-05-15 10:22:31.389 [WARNING][4997] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" HandleID="k8s-pod-network.59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" Workload="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" May 15 10:22:31.398327 env[1217]: 2025-05-15 10:22:31.389 [INFO][4997] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" HandleID="k8s-pod-network.59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" Workload="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" May 15 10:22:31.398327 env[1217]: 2025-05-15 10:22:31.392 [INFO][4997] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:31.398327 env[1217]: 2025-05-15 10:22:31.395 [INFO][4989] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" May 15 10:22:31.398327 env[1217]: time="2025-05-15T10:22:31.398297776Z" level=info msg="TearDown network for sandbox \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\" successfully" May 15 10:22:31.399402 env[1217]: time="2025-05-15T10:22:31.398335416Z" level=info msg="StopPodSandbox for \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\" returns successfully" May 15 10:22:31.399402 env[1217]: time="2025-05-15T10:22:31.399326091Z" level=info msg="RemovePodSandbox for \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\"" May 15 10:22:31.399402 env[1217]: time="2025-05-15T10:22:31.399357251Z" level=info msg="Forcibly stopping sandbox \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\"" May 15 10:22:31.475392 env[1217]: 2025-05-15 10:22:31.442 [WARNING][5022] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0", GenerateName:"calico-apiserver-5c4847f848-", Namespace:"calico-apiserver", SelfLink:"", UID:"b79ed0d1-14ce-496a-97e8-22f5c01122ae", ResourceVersion:"945", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c4847f848", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"58957d7b8c6b04eb752865f484469ff6fee130a1a94e698ad5f53ec197d46c43", Pod:"calico-apiserver-5c4847f848-xb28g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali29aa6264058", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:31.475392 env[1217]: 2025-05-15 10:22:31.442 [INFO][5022] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" May 15 10:22:31.475392 env[1217]: 2025-05-15 10:22:31.442 [INFO][5022] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" iface="eth0" netns="" May 15 10:22:31.475392 env[1217]: 2025-05-15 10:22:31.442 [INFO][5022] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" May 15 10:22:31.475392 env[1217]: 2025-05-15 10:22:31.442 [INFO][5022] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" May 15 10:22:31.475392 env[1217]: 2025-05-15 10:22:31.459 [INFO][5030] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" HandleID="k8s-pod-network.59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" Workload="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" May 15 10:22:31.475392 env[1217]: 2025-05-15 10:22:31.460 [INFO][5030] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:31.475392 env[1217]: 2025-05-15 10:22:31.460 [INFO][5030] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:31.475392 env[1217]: 2025-05-15 10:22:31.470 [WARNING][5030] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" HandleID="k8s-pod-network.59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" Workload="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" May 15 10:22:31.475392 env[1217]: 2025-05-15 10:22:31.470 [INFO][5030] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" HandleID="k8s-pod-network.59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" Workload="localhost-k8s-calico--apiserver--5c4847f848--xb28g-eth0" May 15 10:22:31.475392 env[1217]: 2025-05-15 10:22:31.472 [INFO][5030] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:31.475392 env[1217]: 2025-05-15 10:22:31.474 [INFO][5022] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809" May 15 10:22:31.476067 env[1217]: time="2025-05-15T10:22:31.475420429Z" level=info msg="TearDown network for sandbox \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\" successfully" May 15 10:22:31.484265 env[1217]: time="2025-05-15T10:22:31.483897747Z" level=info msg="RemovePodSandbox \"59a11a389fdb123057a0a76770b7ee89a93a976188cb5742358413920cc0b809\" returns successfully" May 15 10:22:31.485067 env[1217]: time="2025-05-15T10:22:31.484367465Z" level=info msg="StopPodSandbox for \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\"" May 15 10:22:31.563567 env[1217]: 2025-05-15 10:22:31.520 [WARNING][5052] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--2lh5x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ef184343-07cc-49e8-9335-04743ecda65a", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce", Pod:"csi-node-driver-2lh5x", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaee07c7a74e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:31.563567 env[1217]: 2025-05-15 10:22:31.520 [INFO][5052] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" May 15 10:22:31.563567 env[1217]: 2025-05-15 10:22:31.520 [INFO][5052] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" iface="eth0" netns="" May 15 10:22:31.563567 env[1217]: 2025-05-15 10:22:31.520 [INFO][5052] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" May 15 10:22:31.563567 env[1217]: 2025-05-15 10:22:31.520 [INFO][5052] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" May 15 10:22:31.563567 env[1217]: 2025-05-15 10:22:31.550 [INFO][5061] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" HandleID="k8s-pod-network.d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" Workload="localhost-k8s-csi--node--driver--2lh5x-eth0" May 15 10:22:31.563567 env[1217]: 2025-05-15 10:22:31.551 [INFO][5061] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:31.563567 env[1217]: 2025-05-15 10:22:31.551 [INFO][5061] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:31.563567 env[1217]: 2025-05-15 10:22:31.559 [WARNING][5061] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" HandleID="k8s-pod-network.d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" Workload="localhost-k8s-csi--node--driver--2lh5x-eth0" May 15 10:22:31.563567 env[1217]: 2025-05-15 10:22:31.559 [INFO][5061] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" HandleID="k8s-pod-network.d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" Workload="localhost-k8s-csi--node--driver--2lh5x-eth0" May 15 10:22:31.563567 env[1217]: 2025-05-15 10:22:31.560 [INFO][5061] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:31.563567 env[1217]: 2025-05-15 10:22:31.562 [INFO][5052] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" May 15 10:22:31.564219 env[1217]: time="2025-05-15T10:22:31.563602667Z" level=info msg="TearDown network for sandbox \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\" successfully" May 15 10:22:31.564219 env[1217]: time="2025-05-15T10:22:31.563645627Z" level=info msg="StopPodSandbox for \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\" returns successfully" May 15 10:22:31.564765 env[1217]: time="2025-05-15T10:22:31.564734421Z" level=info msg="RemovePodSandbox for \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\"" May 15 10:22:31.564901 env[1217]: time="2025-05-15T10:22:31.564862061Z" level=info msg="Forcibly stopping sandbox \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\"" May 15 10:22:31.631786 env[1217]: 2025-05-15 10:22:31.601 [WARNING][5083] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--2lh5x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ef184343-07cc-49e8-9335-04743ecda65a", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a2a69a714738aba37264f7236da8649d14b458b38dde90387462514467e397ce", Pod:"csi-node-driver-2lh5x", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaee07c7a74e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:31.631786 env[1217]: 2025-05-15 10:22:31.601 [INFO][5083] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" May 15 10:22:31.631786 env[1217]: 2025-05-15 10:22:31.601 [INFO][5083] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" iface="eth0" netns="" May 15 10:22:31.631786 env[1217]: 2025-05-15 10:22:31.601 [INFO][5083] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" May 15 10:22:31.631786 env[1217]: 2025-05-15 10:22:31.601 [INFO][5083] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" May 15 10:22:31.631786 env[1217]: 2025-05-15 10:22:31.619 [INFO][5092] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" HandleID="k8s-pod-network.d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" Workload="localhost-k8s-csi--node--driver--2lh5x-eth0" May 15 10:22:31.631786 env[1217]: 2025-05-15 10:22:31.619 [INFO][5092] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:31.631786 env[1217]: 2025-05-15 10:22:31.619 [INFO][5092] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:31.631786 env[1217]: 2025-05-15 10:22:31.627 [WARNING][5092] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" HandleID="k8s-pod-network.d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" Workload="localhost-k8s-csi--node--driver--2lh5x-eth0" May 15 10:22:31.631786 env[1217]: 2025-05-15 10:22:31.627 [INFO][5092] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" HandleID="k8s-pod-network.d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" Workload="localhost-k8s-csi--node--driver--2lh5x-eth0" May 15 10:22:31.631786 env[1217]: 2025-05-15 10:22:31.628 [INFO][5092] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:31.631786 env[1217]: 2025-05-15 10:22:31.630 [INFO][5083] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5" May 15 10:22:31.632294 env[1217]: time="2025-05-15T10:22:31.631818885Z" level=info msg="TearDown network for sandbox \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\" successfully" May 15 10:22:31.634688 env[1217]: time="2025-05-15T10:22:31.634650230Z" level=info msg="RemovePodSandbox \"d68ee56e095f0526d13a3e7291461401eeea7b441ecf2e01d92b3c1a1020bbc5\" returns successfully" May 15 10:22:31.635249 env[1217]: time="2025-05-15T10:22:31.635212748Z" level=info msg="StopPodSandbox for \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\"" May 15 10:22:31.699522 env[1217]: 2025-05-15 10:22:31.668 [WARNING][5114] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0", GenerateName:"calico-kube-controllers-74bdffb748-", Namespace:"calico-system", SelfLink:"", UID:"53220aaf-f836-49cd-aefa-94243d2976b9", ResourceVersion:"986", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74bdffb748", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a", Pod:"calico-kube-controllers-74bdffb748-sc7rm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali2da053663fd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:31.699522 env[1217]: 2025-05-15 10:22:31.668 [INFO][5114] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" May 15 10:22:31.699522 env[1217]: 2025-05-15 10:22:31.668 [INFO][5114] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" iface="eth0" netns="" May 15 10:22:31.699522 env[1217]: 2025-05-15 10:22:31.668 [INFO][5114] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" May 15 10:22:31.699522 env[1217]: 2025-05-15 10:22:31.669 [INFO][5114] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" May 15 10:22:31.699522 env[1217]: 2025-05-15 10:22:31.686 [INFO][5122] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" HandleID="k8s-pod-network.81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" Workload="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" May 15 10:22:31.699522 env[1217]: 2025-05-15 10:22:31.687 [INFO][5122] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:31.699522 env[1217]: 2025-05-15 10:22:31.687 [INFO][5122] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:31.699522 env[1217]: 2025-05-15 10:22:31.695 [WARNING][5122] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" HandleID="k8s-pod-network.81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" Workload="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" May 15 10:22:31.699522 env[1217]: 2025-05-15 10:22:31.695 [INFO][5122] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" HandleID="k8s-pod-network.81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" Workload="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" May 15 10:22:31.699522 env[1217]: 2025-05-15 10:22:31.696 [INFO][5122] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:31.699522 env[1217]: 2025-05-15 10:22:31.698 [INFO][5114] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" May 15 10:22:31.699522 env[1217]: time="2025-05-15T10:22:31.699490865Z" level=info msg="TearDown network for sandbox \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\" successfully" May 15 10:22:31.699522 env[1217]: time="2025-05-15T10:22:31.699520425Z" level=info msg="StopPodSandbox for \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\" returns successfully" May 15 10:22:31.701461 env[1217]: time="2025-05-15T10:22:31.701435855Z" level=info msg="RemovePodSandbox for \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\"" May 15 10:22:31.701629 env[1217]: time="2025-05-15T10:22:31.701581335Z" level=info msg="Forcibly stopping sandbox \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\"" May 15 10:22:31.773514 env[1217]: 2025-05-15 10:22:31.742 [WARNING][5146] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0", GenerateName:"calico-kube-controllers-74bdffb748-", Namespace:"calico-system", SelfLink:"", UID:"53220aaf-f836-49cd-aefa-94243d2976b9", ResourceVersion:"986", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74bdffb748", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dced9a515f941ae98d6a1f2e5f45696ca2b9c4a5408c3f57e57f3b3a8b73379a", Pod:"calico-kube-controllers-74bdffb748-sc7rm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali2da053663fd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:31.773514 env[1217]: 2025-05-15 10:22:31.742 [INFO][5146] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" May 15 10:22:31.773514 env[1217]: 2025-05-15 10:22:31.742 [INFO][5146] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" iface="eth0" netns="" May 15 10:22:31.773514 env[1217]: 2025-05-15 10:22:31.742 [INFO][5146] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" May 15 10:22:31.773514 env[1217]: 2025-05-15 10:22:31.742 [INFO][5146] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" May 15 10:22:31.773514 env[1217]: 2025-05-15 10:22:31.761 [INFO][5155] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" HandleID="k8s-pod-network.81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" Workload="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" May 15 10:22:31.773514 env[1217]: 2025-05-15 10:22:31.761 [INFO][5155] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:31.773514 env[1217]: 2025-05-15 10:22:31.761 [INFO][5155] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:31.773514 env[1217]: 2025-05-15 10:22:31.769 [WARNING][5155] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" HandleID="k8s-pod-network.81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" Workload="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" May 15 10:22:31.773514 env[1217]: 2025-05-15 10:22:31.769 [INFO][5155] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" HandleID="k8s-pod-network.81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" Workload="localhost-k8s-calico--kube--controllers--74bdffb748--sc7rm-eth0" May 15 10:22:31.773514 env[1217]: 2025-05-15 10:22:31.770 [INFO][5155] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:31.773514 env[1217]: 2025-05-15 10:22:31.772 [INFO][5146] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f" May 15 10:22:31.774107 env[1217]: time="2025-05-15T10:22:31.773527973Z" level=info msg="TearDown network for sandbox \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\" successfully" May 15 10:22:31.778859 env[1217]: time="2025-05-15T10:22:31.778780947Z" level=info msg="RemovePodSandbox \"81ab2260678e56182a7c2100593ad6216769b11780607eef5a40a4b721737c4f\" returns successfully" May 15 10:22:31.779448 env[1217]: time="2025-05-15T10:22:31.779419784Z" level=info msg="StopPodSandbox for \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\"" May 15 10:22:31.857581 env[1217]: 2025-05-15 10:22:31.816 [WARNING][5178] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0", GenerateName:"calico-apiserver-5c4847f848-", Namespace:"calico-apiserver", SelfLink:"", UID:"a8c1e0fc-e162-4660-8541-ae03de4774d5", ResourceVersion:"1022", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c4847f848", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3", Pod:"calico-apiserver-5c4847f848-zht7m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califb87df8d383", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:31.857581 env[1217]: 2025-05-15 10:22:31.817 [INFO][5178] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" May 15 10:22:31.857581 env[1217]: 2025-05-15 10:22:31.817 [INFO][5178] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" iface="eth0" netns="" May 15 10:22:31.857581 env[1217]: 2025-05-15 10:22:31.817 [INFO][5178] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" May 15 10:22:31.857581 env[1217]: 2025-05-15 10:22:31.817 [INFO][5178] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" May 15 10:22:31.857581 env[1217]: 2025-05-15 10:22:31.844 [INFO][5186] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" HandleID="k8s-pod-network.e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" Workload="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" May 15 10:22:31.857581 env[1217]: 2025-05-15 10:22:31.844 [INFO][5186] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:31.857581 env[1217]: 2025-05-15 10:22:31.844 [INFO][5186] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:31.857581 env[1217]: 2025-05-15 10:22:31.853 [WARNING][5186] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" HandleID="k8s-pod-network.e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" Workload="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" May 15 10:22:31.857581 env[1217]: 2025-05-15 10:22:31.853 [INFO][5186] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" HandleID="k8s-pod-network.e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" Workload="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" May 15 10:22:31.857581 env[1217]: 2025-05-15 10:22:31.854 [INFO][5186] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:31.857581 env[1217]: 2025-05-15 10:22:31.856 [INFO][5178] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" May 15 10:22:31.858097 env[1217]: time="2025-05-15T10:22:31.858063589Z" level=info msg="TearDown network for sandbox \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\" successfully" May 15 10:22:31.858202 env[1217]: time="2025-05-15T10:22:31.858155069Z" level=info msg="StopPodSandbox for \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\" returns successfully" May 15 10:22:31.858866 env[1217]: time="2025-05-15T10:22:31.858774626Z" level=info msg="RemovePodSandbox for \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\"" May 15 10:22:31.859068 env[1217]: time="2025-05-15T10:22:31.858979825Z" level=info msg="Forcibly stopping sandbox \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\"" May 15 10:22:31.932053 env[1217]: 2025-05-15 10:22:31.901 [WARNING][5208] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0", GenerateName:"calico-apiserver-5c4847f848-", Namespace:"calico-apiserver", SelfLink:"", UID:"a8c1e0fc-e162-4660-8541-ae03de4774d5", ResourceVersion:"1022", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c4847f848", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5871565ff8c173f323ff5344f214cee5a4380124881ea776693711585a7e2fc3", Pod:"calico-apiserver-5c4847f848-zht7m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califb87df8d383", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:31.932053 env[1217]: 2025-05-15 10:22:31.901 [INFO][5208] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" May 15 10:22:31.932053 env[1217]: 2025-05-15 10:22:31.901 [INFO][5208] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" iface="eth0" netns="" May 15 10:22:31.932053 env[1217]: 2025-05-15 10:22:31.901 [INFO][5208] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" May 15 10:22:31.932053 env[1217]: 2025-05-15 10:22:31.901 [INFO][5208] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" May 15 10:22:31.932053 env[1217]: 2025-05-15 10:22:31.919 [INFO][5217] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" HandleID="k8s-pod-network.e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" Workload="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" May 15 10:22:31.932053 env[1217]: 2025-05-15 10:22:31.920 [INFO][5217] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:31.932053 env[1217]: 2025-05-15 10:22:31.920 [INFO][5217] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:31.932053 env[1217]: 2025-05-15 10:22:31.927 [WARNING][5217] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" HandleID="k8s-pod-network.e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" Workload="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" May 15 10:22:31.932053 env[1217]: 2025-05-15 10:22:31.928 [INFO][5217] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" HandleID="k8s-pod-network.e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" Workload="localhost-k8s-calico--apiserver--5c4847f848--zht7m-eth0" May 15 10:22:31.932053 env[1217]: 2025-05-15 10:22:31.929 [INFO][5217] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:31.932053 env[1217]: 2025-05-15 10:22:31.930 [INFO][5208] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc" May 15 10:22:31.932574 env[1217]: time="2025-05-15T10:22:31.932540376Z" level=info msg="TearDown network for sandbox \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\" successfully" May 15 10:22:31.935448 env[1217]: time="2025-05-15T10:22:31.935413721Z" level=info msg="RemovePodSandbox \"e6799012a8f0a4def0316ee3c812a889187f1d5359f6f3a99c2d5d2e70d28bdc\" returns successfully" May 15 10:22:31.936128 env[1217]: time="2025-05-15T10:22:31.936086918Z" level=info msg="StopPodSandbox for \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\"" May 15 10:22:31.999361 env[1217]: 2025-05-15 10:22:31.969 [WARNING][5239] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"0f11ae80-4684-4751-8047-b43bdb1f9716", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b", Pod:"coredns-7db6d8ff4d-59vhs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calida3546e7ce4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:31.999361 env[1217]: 2025-05-15 10:22:31.969 [INFO][5239] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" May 15 10:22:31.999361 env[1217]: 2025-05-15 10:22:31.969 [INFO][5239] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" iface="eth0" netns="" May 15 10:22:31.999361 env[1217]: 2025-05-15 10:22:31.969 [INFO][5239] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" May 15 10:22:31.999361 env[1217]: 2025-05-15 10:22:31.969 [INFO][5239] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" May 15 10:22:31.999361 env[1217]: 2025-05-15 10:22:31.987 [INFO][5248] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" HandleID="k8s-pod-network.d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" Workload="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" May 15 10:22:31.999361 env[1217]: 2025-05-15 10:22:31.987 [INFO][5248] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:31.999361 env[1217]: 2025-05-15 10:22:31.987 [INFO][5248] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:31.999361 env[1217]: 2025-05-15 10:22:31.995 [WARNING][5248] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" HandleID="k8s-pod-network.d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" Workload="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" May 15 10:22:31.999361 env[1217]: 2025-05-15 10:22:31.995 [INFO][5248] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" HandleID="k8s-pod-network.d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" Workload="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" May 15 10:22:31.999361 env[1217]: 2025-05-15 10:22:31.996 [INFO][5248] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:31.999361 env[1217]: 2025-05-15 10:22:31.998 [INFO][5239] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" May 15 10:22:31.999361 env[1217]: time="2025-05-15T10:22:31.999324680Z" level=info msg="TearDown network for sandbox \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\" successfully" May 15 10:22:31.999361 env[1217]: time="2025-05-15T10:22:31.999354480Z" level=info msg="StopPodSandbox for \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\" returns successfully" May 15 10:22:32.000953 env[1217]: time="2025-05-15T10:22:32.000925112Z" level=info msg="RemovePodSandbox for \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\"" May 15 10:22:32.001094 env[1217]: time="2025-05-15T10:22:32.001055472Z" level=info msg="Forcibly stopping sandbox \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\"" May 15 10:22:32.065311 env[1217]: 2025-05-15 10:22:32.036 [WARNING][5271] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"0f11ae80-4684-4751-8047-b43bdb1f9716", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 21, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2dc001d11000c0552de7399deead914910b9ae659058a97becd7b1749f65dd5b", Pod:"coredns-7db6d8ff4d-59vhs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calida3546e7ce4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:32.065311 env[1217]: 2025-05-15 10:22:32.036 [INFO][5271] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" May 15 10:22:32.065311 env[1217]: 2025-05-15 10:22:32.036 [INFO][5271] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" iface="eth0" netns="" May 15 10:22:32.065311 env[1217]: 2025-05-15 10:22:32.036 [INFO][5271] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" May 15 10:22:32.065311 env[1217]: 2025-05-15 10:22:32.036 [INFO][5271] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" May 15 10:22:32.065311 env[1217]: 2025-05-15 10:22:32.053 [INFO][5279] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" HandleID="k8s-pod-network.d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" Workload="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" May 15 10:22:32.065311 env[1217]: 2025-05-15 10:22:32.054 [INFO][5279] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:32.065311 env[1217]: 2025-05-15 10:22:32.054 [INFO][5279] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:32.065311 env[1217]: 2025-05-15 10:22:32.061 [WARNING][5279] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" HandleID="k8s-pod-network.d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" Workload="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" May 15 10:22:32.065311 env[1217]: 2025-05-15 10:22:32.061 [INFO][5279] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" HandleID="k8s-pod-network.d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" Workload="localhost-k8s-coredns--7db6d8ff4d--59vhs-eth0" May 15 10:22:32.065311 env[1217]: 2025-05-15 10:22:32.062 [INFO][5279] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:32.065311 env[1217]: 2025-05-15 10:22:32.064 [INFO][5271] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c" May 15 10:22:32.065739 env[1217]: time="2025-05-15T10:22:32.065348192Z" level=info msg="TearDown network for sandbox \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\" successfully" May 15 10:22:32.068588 env[1217]: time="2025-05-15T10:22:32.068549056Z" level=info msg="RemovePodSandbox \"d06873c0d8ef692b980356c16cf898e39bac565ee9a0ce365ab06fd7b440270c\" returns successfully" May 15 10:22:33.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.103:22-10.0.0.1:37962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:33.204693 systemd[1]: Started sshd@15-10.0.0.103:22-10.0.0.1:37962.service. May 15 10:22:33.206043 kernel: kauditd_printk_skb: 25 callbacks suppressed May 15 10:22:33.206119 kernel: audit: type=1130 audit(1747304553.204:1424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.103:22-10.0.0.1:37962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:33.248000 audit[5288]: USER_ACCT pid=5288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.249188 sshd[5288]: Accepted publickey for core from 10.0.0.1 port 37962 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:22:33.250843 sshd[5288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:22:33.250000 audit[5288]: CRED_ACQ pid=5288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.255262 kernel: audit: type=1101 audit(1747304553.248:1425): pid=5288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.255314 kernel: audit: type=1103 audit(1747304553.250:1426): pid=5288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.255341 kernel: audit: type=1006 audit(1747304553.250:1427): pid=5288 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 15 10:22:33.255243 systemd[1]: Started session-16.scope. May 15 10:22:33.256401 systemd-logind[1203]: New session 16 of user core. May 15 10:22:33.250000 audit[5288]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc0abb70 a2=3 a3=1 items=0 ppid=1 pid=5288 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:33.260441 kernel: audit: type=1300 audit(1747304553.250:1427): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc0abb70 a2=3 a3=1 items=0 ppid=1 pid=5288 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:33.260505 kernel: audit: type=1327 audit(1747304553.250:1427): proctitle=737368643A20636F7265205B707269765D May 15 10:22:33.250000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:22:33.261963 kernel: audit: type=1105 audit(1747304553.260:1428): pid=5288 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.260000 audit[5288]: USER_START pid=5288 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.262000 audit[5290]: CRED_ACQ pid=5290 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.267654 kernel: audit: type=1103 audit(1747304553.262:1429): pid=5290 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.388502 sshd[5288]: pam_unix(sshd:session): session closed for user core May 15 10:22:33.389000 audit[5288]: USER_END pid=5288 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.391690 systemd[1]: sshd@15-10.0.0.103:22-10.0.0.1:37962.service: Deactivated successfully. May 15 10:22:33.392475 systemd[1]: session-16.scope: Deactivated successfully. May 15 10:22:33.393205 systemd-logind[1203]: Session 16 logged out. Waiting for processes to exit. May 15 10:22:33.389000 audit[5288]: CRED_DISP pid=5288 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.395129 systemd[1]: Started sshd@16-10.0.0.103:22-10.0.0.1:37966.service. May 15 10:22:33.395982 systemd-logind[1203]: Removed session 16. May 15 10:22:33.396205 kernel: audit: type=1106 audit(1747304553.389:1430): pid=5288 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.396246 kernel: audit: type=1104 audit(1747304553.389:1431): pid=5288 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.103:22-10.0.0.1:37962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:33.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.103:22-10.0.0.1:37966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:33.433000 audit[5302]: USER_ACCT pid=5302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.434195 sshd[5302]: Accepted publickey for core from 10.0.0.1 port 37966 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:22:33.435000 audit[5302]: CRED_ACQ pid=5302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.435000 audit[5302]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd444fd10 a2=3 a3=1 items=0 ppid=1 pid=5302 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:33.435000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:22:33.435902 sshd[5302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:22:33.439156 systemd-logind[1203]: New session 17 of user core. May 15 10:22:33.440549 systemd[1]: Started session-17.scope. May 15 10:22:33.444000 audit[5302]: USER_START pid=5302 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.445000 audit[5304]: CRED_ACQ pid=5304 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.679578 sshd[5302]: pam_unix(sshd:session): session closed for user core May 15 10:22:33.682000 audit[5302]: USER_END pid=5302 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.682000 audit[5302]: CRED_DISP pid=5302 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.683719 systemd[1]: Started sshd@17-10.0.0.103:22-10.0.0.1:37968.service. May 15 10:22:33.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.103:22-10.0.0.1:37968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:33.684303 systemd[1]: sshd@16-10.0.0.103:22-10.0.0.1:37966.service: Deactivated successfully. May 15 10:22:33.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.103:22-10.0.0.1:37966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:33.685080 systemd[1]: session-17.scope: Deactivated successfully. May 15 10:22:33.686442 systemd-logind[1203]: Session 17 logged out. Waiting for processes to exit. May 15 10:22:33.690257 systemd-logind[1203]: Removed session 17. May 15 10:22:33.731841 sshd[5312]: Accepted publickey for core from 10.0.0.1 port 37968 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:22:33.731000 audit[5312]: USER_ACCT pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.733223 sshd[5312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:22:33.732000 audit[5312]: CRED_ACQ pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.732000 audit[5312]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe86aa1c0 a2=3 a3=1 items=0 ppid=1 pid=5312 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:33.732000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:22:33.737663 systemd[1]: Started session-18.scope. May 15 10:22:33.738077 systemd-logind[1203]: New session 18 of user core. May 15 10:22:33.741000 audit[5312]: USER_START pid=5312 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:33.742000 audit[5315]: CRED_ACQ pid=5315 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:35.270000 audit[5329]: NETFILTER_CFG table=filter:111 family=2 entries=20 op=nft_register_rule pid=5329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:35.270000 audit[5329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffd8d19b00 a2=0 a3=1 items=0 ppid=2262 pid=5329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:35.270000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:35.279000 audit[5329]: NETFILTER_CFG table=nat:112 family=2 entries=22 op=nft_register_rule pid=5329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:35.279000 audit[5329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffd8d19b00 a2=0 a3=1 items=0 ppid=2262 pid=5329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:35.279000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:35.287372 sshd[5312]: pam_unix(sshd:session): session closed for user core May 15 10:22:35.291833 systemd[1]: Started sshd@18-10.0.0.103:22-10.0.0.1:37972.service. May 15 10:22:35.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.103:22-10.0.0.1:37972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:35.292000 audit[5312]: USER_END pid=5312 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:35.292000 audit[5312]: CRED_DISP pid=5312 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:35.296501 systemd[1]: sshd@17-10.0.0.103:22-10.0.0.1:37968.service: Deactivated successfully. May 15 10:22:35.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.103:22-10.0.0.1:37968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:35.297401 systemd[1]: session-18.scope: Deactivated successfully. May 15 10:22:35.300772 systemd-logind[1203]: Session 18 logged out. Waiting for processes to exit. May 15 10:22:35.301843 systemd-logind[1203]: Removed session 18. May 15 10:22:35.301000 audit[5334]: NETFILTER_CFG table=filter:113 family=2 entries=32 op=nft_register_rule pid=5334 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:35.301000 audit[5334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffee3cdc40 a2=0 a3=1 items=0 ppid=2262 pid=5334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:35.301000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:35.311000 audit[5334]: NETFILTER_CFG table=nat:114 family=2 entries=22 op=nft_register_rule pid=5334 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:35.311000 audit[5334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffee3cdc40 a2=0 a3=1 items=0 ppid=2262 pid=5334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:35.311000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:35.334000 audit[5331]: USER_ACCT pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:35.335224 sshd[5331]: Accepted publickey for core from 10.0.0.1 port 37972 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:22:35.335000 audit[5331]: CRED_ACQ pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:35.335000 audit[5331]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffdc3e4f0 a2=3 a3=1 items=0 ppid=1 pid=5331 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:35.335000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:22:35.336426 sshd[5331]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:22:35.340635 systemd[1]: Started session-19.scope. May 15 10:22:35.341847 systemd-logind[1203]: New session 19 of user core. May 15 10:22:35.347000 audit[5331]: USER_START pid=5331 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:35.348000 audit[5336]: CRED_ACQ pid=5336 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:35.594747 sshd[5331]: pam_unix(sshd:session): session closed for user core May 15 10:22:35.595000 audit[5331]: USER_END pid=5331 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:35.595000 audit[5331]: CRED_DISP pid=5331 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:35.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.103:22-10.0.0.1:37972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:35.597589 systemd[1]: sshd@18-10.0.0.103:22-10.0.0.1:37972.service: Deactivated successfully. May 15 10:22:35.598643 systemd[1]: session-19.scope: Deactivated successfully. May 15 10:22:35.599782 systemd-logind[1203]: Session 19 logged out. Waiting for processes to exit. May 15 10:22:35.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.103:22-10.0.0.1:37980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:35.601362 systemd[1]: Started sshd@19-10.0.0.103:22-10.0.0.1:37980.service. May 15 10:22:35.602346 systemd-logind[1203]: Removed session 19. May 15 10:22:35.641000 audit[5345]: USER_ACCT pid=5345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:35.642233 sshd[5345]: Accepted publickey for core from 10.0.0.1 port 37980 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:22:35.643000 audit[5345]: CRED_ACQ pid=5345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:35.643000 audit[5345]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd02c0f30 a2=3 a3=1 items=0 ppid=1 pid=5345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:35.643000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:22:35.643614 sshd[5345]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:22:35.647775 systemd[1]: Started session-20.scope. May 15 10:22:35.647930 systemd-logind[1203]: New session 20 of user core. May 15 10:22:35.651000 audit[5345]: USER_START pid=5345 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:35.653000 audit[5347]: CRED_ACQ pid=5347 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:35.793043 sshd[5345]: pam_unix(sshd:session): session closed for user core May 15 10:22:35.793000 audit[5345]: USER_END pid=5345 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:35.793000 audit[5345]: CRED_DISP pid=5345 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:35.795880 systemd[1]: sshd@19-10.0.0.103:22-10.0.0.1:37980.service: Deactivated successfully. May 15 10:22:35.796690 systemd[1]: session-20.scope: Deactivated successfully. May 15 10:22:35.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.103:22-10.0.0.1:37980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:35.797313 systemd-logind[1203]: Session 20 logged out. Waiting for processes to exit. May 15 10:22:35.797960 systemd-logind[1203]: Removed session 20. May 15 10:22:40.797804 systemd[1]: Started sshd@20-10.0.0.103:22-10.0.0.1:37986.service. May 15 10:22:40.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.103:22-10.0.0.1:37986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:40.798644 kernel: kauditd_printk_skb: 57 callbacks suppressed May 15 10:22:40.798716 kernel: audit: type=1130 audit(1747304560.796:1473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.103:22-10.0.0.1:37986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:40.835000 audit[5366]: USER_ACCT pid=5366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:40.837814 sshd[5366]: Accepted publickey for core from 10.0.0.1 port 37986 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:22:40.837000 audit[5366]: CRED_ACQ pid=5366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:40.839691 sshd[5366]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:22:40.845203 kernel: audit: type=1101 audit(1747304560.835:1474): pid=5366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:40.845333 kernel: audit: type=1103 audit(1747304560.837:1475): pid=5366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:40.845359 kernel: audit: type=1006 audit(1747304560.838:1476): pid=5366 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 15 10:22:40.845383 kernel: audit: type=1300 audit(1747304560.838:1476): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd920ab0 a2=3 a3=1 items=0 ppid=1 pid=5366 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:40.838000 audit[5366]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd920ab0 a2=3 a3=1 items=0 ppid=1 pid=5366 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:40.850423 kernel: audit: type=1327 audit(1747304560.838:1476): proctitle=737368643A20636F7265205B707269765D May 15 10:22:40.838000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:22:40.850429 systemd[1]: Started session-21.scope. May 15 10:22:40.850677 systemd-logind[1203]: New session 21 of user core. May 15 10:22:40.859000 audit[5366]: USER_START pid=5366 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:40.861000 audit[5368]: CRED_ACQ pid=5368 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:40.868309 kernel: audit: type=1105 audit(1747304560.859:1477): pid=5366 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:40.868415 kernel: audit: type=1103 audit(1747304560.861:1478): pid=5368 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:40.871000 audit[5370]: NETFILTER_CFG table=filter:115 family=2 entries=20 op=nft_register_rule pid=5370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:40.871000 audit[5370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe72b0e10 a2=0 a3=1 items=0 ppid=2262 pid=5370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:40.878860 kernel: audit: type=1325 audit(1747304560.871:1479): table=filter:115 family=2 entries=20 op=nft_register_rule pid=5370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:40.878955 kernel: audit: type=1300 audit(1747304560.871:1479): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe72b0e10 a2=0 a3=1 items=0 ppid=2262 pid=5370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:40.871000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:40.884000 audit[5370]: NETFILTER_CFG table=nat:116 family=2 entries=106 op=nft_register_chain pid=5370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:40.884000 audit[5370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffe72b0e10 a2=0 a3=1 items=0 ppid=2262 pid=5370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:40.884000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:40.982217 sshd[5366]: pam_unix(sshd:session): session closed for user core May 15 10:22:40.982000 audit[5366]: USER_END pid=5366 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:40.982000 audit[5366]: CRED_DISP pid=5366 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:40.986002 systemd[1]: sshd@20-10.0.0.103:22-10.0.0.1:37986.service: Deactivated successfully. May 15 10:22:40.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.103:22-10.0.0.1:37986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:40.986828 systemd[1]: session-21.scope: Deactivated successfully. May 15 10:22:40.987418 systemd-logind[1203]: Session 21 logged out. Waiting for processes to exit. May 15 10:22:40.988242 systemd-logind[1203]: Removed session 21. May 15 10:22:41.986333 kubelet[2061]: E0515 10:22:41.986300 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:44.357000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:22:44.357000 audit[1946]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001a041e0 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:22:44.357000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:22:44.357000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:22:44.357000 audit[1946]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001a04200 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:22:44.357000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:22:44.358000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:22:44.358000 audit[1946]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4003082460 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:22:44.358000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:22:44.358000 audit[1946]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001a043a0 a2=fc6 a3=0 items=0 ppid=1788 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c756,c876 key=(null) May 15 10:22:44.358000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:22:44.358000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:22:45.987225 systemd[1]: Started sshd@21-10.0.0.103:22-10.0.0.1:41914.service. May 15 10:22:45.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.103:22-10.0.0.1:41914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:45.988403 kernel: kauditd_printk_skb: 19 callbacks suppressed May 15 10:22:45.988488 kernel: audit: type=1130 audit(1747304565.986:1488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.103:22-10.0.0.1:41914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:46.027000 audit[5404]: USER_ACCT pid=5404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:46.029193 sshd[5404]: Accepted publickey for core from 10.0.0.1 port 41914 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:22:46.030061 sshd[5404]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:22:46.028000 audit[5404]: CRED_ACQ pid=5404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:46.035816 kernel: audit: type=1101 audit(1747304566.027:1489): pid=5404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:46.035883 kernel: audit: type=1103 audit(1747304566.028:1490): pid=5404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:46.035914 kernel: audit: type=1006 audit(1747304566.028:1491): pid=5404 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 15 10:22:46.034984 systemd-logind[1203]: New session 22 of user core. May 15 10:22:46.035318 systemd[1]: Started session-22.scope. May 15 10:22:46.037258 kernel: audit: type=1300 audit(1747304566.028:1491): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9254550 a2=3 a3=1 items=0 ppid=1 pid=5404 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:46.028000 audit[5404]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9254550 a2=3 a3=1 items=0 ppid=1 pid=5404 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:46.028000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:22:46.041540 kernel: audit: type=1327 audit(1747304566.028:1491): proctitle=737368643A20636F7265205B707269765D May 15 10:22:46.041598 kernel: audit: type=1105 audit(1747304566.039:1492): pid=5404 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:46.039000 audit[5404]: USER_START pid=5404 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:46.040000 audit[5406]: CRED_ACQ pid=5406 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:46.048080 kernel: audit: type=1103 audit(1747304566.040:1493): pid=5406 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:46.164682 sshd[5404]: pam_unix(sshd:session): session closed for user core May 15 10:22:46.164000 audit[5404]: USER_END pid=5404 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:46.167304 systemd[1]: sshd@21-10.0.0.103:22-10.0.0.1:41914.service: Deactivated successfully. May 15 10:22:46.168067 systemd[1]: session-22.scope: Deactivated successfully. May 15 10:22:46.168619 systemd-logind[1203]: Session 22 logged out. Waiting for processes to exit. May 15 10:22:46.164000 audit[5404]: CRED_DISP pid=5404 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:46.169454 systemd-logind[1203]: Removed session 22. May 15 10:22:46.172260 kernel: audit: type=1106 audit(1747304566.164:1494): pid=5404 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:46.172404 kernel: audit: type=1104 audit(1747304566.164:1495): pid=5404 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:46.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.103:22-10.0.0.1:41914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:48.133321 kubelet[2061]: E0515 10:22:48.133287 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:51.133845 kubelet[2061]: E0515 10:22:51.133802 2061 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:51.169916 systemd[1]: Started sshd@22-10.0.0.103:22-10.0.0.1:41926.service. May 15 10:22:51.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.103:22-10.0.0.1:41926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:51.171235 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:22:51.171439 kernel: audit: type=1130 audit(1747304571.168:1497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.103:22-10.0.0.1:41926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:51.208000 audit[5441]: USER_ACCT pid=5441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:51.210227 sshd[5441]: Accepted publickey for core from 10.0.0.1 port 41926 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:22:51.211925 sshd[5441]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:22:51.210000 audit[5441]: CRED_ACQ pid=5441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:51.215483 systemd-logind[1203]: New session 23 of user core. May 15 10:22:51.216345 systemd[1]: Started session-23.scope. May 15 10:22:51.217439 kernel: audit: type=1101 audit(1747304571.208:1498): pid=5441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:51.217505 kernel: audit: type=1103 audit(1747304571.210:1499): pid=5441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:51.217527 kernel: audit: type=1006 audit(1747304571.210:1500): pid=5441 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 15 10:22:51.210000 audit[5441]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffefcb6f90 a2=3 a3=1 items=0 ppid=1 pid=5441 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:51.223219 kernel: audit: type=1300 audit(1747304571.210:1500): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffefcb6f90 a2=3 a3=1 items=0 ppid=1 pid=5441 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:51.210000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:22:51.224692 kernel: audit: type=1327 audit(1747304571.210:1500): proctitle=737368643A20636F7265205B707269765D May 15 10:22:51.224744 kernel: audit: type=1105 audit(1747304571.220:1501): pid=5441 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:51.220000 audit[5441]: USER_START pid=5441 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:51.221000 audit[5443]: CRED_ACQ pid=5443 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:51.231913 kernel: audit: type=1103 audit(1747304571.221:1502): pid=5443 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:51.340065 sshd[5441]: pam_unix(sshd:session): session closed for user core May 15 10:22:51.339000 audit[5441]: USER_END pid=5441 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:51.342776 systemd[1]: sshd@22-10.0.0.103:22-10.0.0.1:41926.service: Deactivated successfully. May 15 10:22:51.343634 systemd[1]: session-23.scope: Deactivated successfully. May 15 10:22:51.344322 systemd-logind[1203]: Session 23 logged out. Waiting for processes to exit. May 15 10:22:51.339000 audit[5441]: CRED_DISP pid=5441 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:51.345067 systemd-logind[1203]: Removed session 23. May 15 10:22:51.348210 kernel: audit: type=1106 audit(1747304571.339:1503): pid=5441 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:51.348301 kernel: audit: type=1104 audit(1747304571.339:1504): pid=5441 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:51.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.103:22-10.0.0.1:41926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:56.345100 systemd[1]: Started sshd@23-10.0.0.103:22-10.0.0.1:44654.service. May 15 10:22:56.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.103:22-10.0.0.1:44654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:56.349692 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:22:56.349757 kernel: audit: type=1130 audit(1747304576.344:1506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.103:22-10.0.0.1:44654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:56.386000 audit[5454]: USER_ACCT pid=5454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:56.387932 sshd[5454]: Accepted publickey for core from 10.0.0.1 port 44654 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:22:56.390612 sshd[5454]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:22:56.389000 audit[5454]: CRED_ACQ pid=5454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:56.395723 kernel: audit: type=1101 audit(1747304576.386:1507): pid=5454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:56.395789 kernel: audit: type=1103 audit(1747304576.389:1508): pid=5454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:56.398262 kernel: audit: type=1006 audit(1747304576.389:1509): pid=5454 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 15 10:22:56.389000 audit[5454]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3d60650 a2=3 a3=1 items=0 ppid=1 pid=5454 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:56.402450 kernel: audit: type=1300 audit(1747304576.389:1509): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3d60650 a2=3 a3=1 items=0 ppid=1 pid=5454 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:56.389000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:22:56.404004 kernel: audit: type=1327 audit(1747304576.389:1509): proctitle=737368643A20636F7265205B707269765D May 15 10:22:56.407082 systemd-logind[1203]: New session 24 of user core. May 15 10:22:56.408757 systemd[1]: Started session-24.scope. May 15 10:22:56.412000 audit[5454]: USER_START pid=5454 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:56.412000 audit[5456]: CRED_ACQ pid=5456 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:56.421340 kernel: audit: type=1105 audit(1747304576.412:1510): pid=5454 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:56.421419 kernel: audit: type=1103 audit(1747304576.412:1511): pid=5456 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:56.527004 sshd[5454]: pam_unix(sshd:session): session closed for user core May 15 10:22:56.526000 audit[5454]: USER_END pid=5454 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:56.529372 systemd[1]: sshd@23-10.0.0.103:22-10.0.0.1:44654.service: Deactivated successfully. May 15 10:22:56.530221 systemd[1]: session-24.scope: Deactivated successfully. May 15 10:22:56.532232 systemd-logind[1203]: Session 24 logged out. Waiting for processes to exit. May 15 10:22:56.526000 audit[5454]: CRED_DISP pid=5454 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:56.535790 kernel: audit: type=1106 audit(1747304576.526:1512): pid=5454 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:56.535840 kernel: audit: type=1104 audit(1747304576.526:1513): pid=5454 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:56.535936 systemd-logind[1203]: Removed session 24. May 15 10:22:56.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.103:22-10.0.0.1:44654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'