May 10 00:42:31.921928 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:42:31.921951 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:42:31.921959 kernel: BIOS-provided physical RAM map: May 10 00:42:31.921965 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 10 00:42:31.921971 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 10 00:42:31.921976 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 10 00:42:31.921983 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable May 10 00:42:31.921989 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved May 10 00:42:31.921996 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 10 00:42:31.922001 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved May 10 00:42:31.922007 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 10 00:42:31.922012 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 10 00:42:31.922018 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 10 00:42:31.922024 kernel: NX (Execute Disable) protection: active May 10 00:42:31.922032 kernel: SMBIOS 2.8 present. May 10 00:42:31.922039 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 May 10 00:42:31.922045 kernel: Hypervisor detected: KVM May 10 00:42:31.922050 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 00:42:31.922059 kernel: kvm-clock: cpu 0, msr 21196001, primary cpu clock May 10 00:42:31.922065 kernel: kvm-clock: using sched offset of 3210960554 cycles May 10 00:42:31.922072 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 00:42:31.922078 kernel: tsc: Detected 2794.748 MHz processor May 10 00:42:31.922085 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:42:31.922093 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:42:31.922099 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 May 10 00:42:31.922105 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:42:31.922111 kernel: Using GB pages for direct mapping May 10 00:42:31.922117 kernel: ACPI: Early table checksum verification disabled May 10 00:42:31.922123 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) May 10 00:42:31.922130 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:42:31.922136 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:42:31.922142 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:42:31.922149 kernel: ACPI: FACS 0x000000009CFE0000 000040 May 10 00:42:31.922155 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:42:31.922162 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:42:31.922168 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:42:31.922174 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:42:31.922180 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] May 10 00:42:31.922186 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] May 10 00:42:31.922192 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] May 10 00:42:31.922202 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] May 10 00:42:31.922208 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] May 10 00:42:31.922215 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] May 10 00:42:31.922222 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] May 10 00:42:31.922228 kernel: No NUMA configuration found May 10 00:42:31.922235 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] May 10 00:42:31.922243 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] May 10 00:42:31.922249 kernel: Zone ranges: May 10 00:42:31.922256 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:42:31.922262 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] May 10 00:42:31.922269 kernel: Normal empty May 10 00:42:31.922275 kernel: Movable zone start for each node May 10 00:42:31.922282 kernel: Early memory node ranges May 10 00:42:31.922288 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 10 00:42:31.922295 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] May 10 00:42:31.922303 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] May 10 00:42:31.922312 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:42:31.922318 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 10 00:42:31.922325 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges May 10 00:42:31.922332 kernel: ACPI: PM-Timer IO Port: 0x608 May 10 00:42:31.922338 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 00:42:31.922345 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 10 00:42:31.922351 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 10 00:42:31.922358 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 00:42:31.922365 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:42:31.922375 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 00:42:31.922382 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 00:42:31.922389 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:42:31.922395 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 10 00:42:31.922402 kernel: TSC deadline timer available May 10 00:42:31.922408 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 10 00:42:31.922415 kernel: kvm-guest: KVM setup pv remote TLB flush May 10 00:42:31.922422 kernel: kvm-guest: setup PV sched yield May 10 00:42:31.922428 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices May 10 00:42:31.922436 kernel: Booting paravirtualized kernel on KVM May 10 00:42:31.922443 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:42:31.922450 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 10 00:42:31.922457 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 10 00:42:31.922464 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 10 00:42:31.922470 kernel: pcpu-alloc: [0] 0 1 2 3 May 10 00:42:31.922477 kernel: kvm-guest: setup async PF for cpu 0 May 10 00:42:31.922483 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 May 10 00:42:31.922490 kernel: kvm-guest: PV spinlocks enabled May 10 00:42:31.922498 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 10 00:42:31.922504 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 May 10 00:42:31.922511 kernel: Policy zone: DMA32 May 10 00:42:31.922519 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:42:31.922526 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:42:31.922532 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 10 00:42:31.922550 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 10 00:42:31.922557 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:42:31.922566 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 134796K reserved, 0K cma-reserved) May 10 00:42:31.922573 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 10 00:42:31.922579 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:42:31.922586 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:42:31.922593 kernel: rcu: Hierarchical RCU implementation. May 10 00:42:31.922600 kernel: rcu: RCU event tracing is enabled. May 10 00:42:31.922607 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 10 00:42:31.922613 kernel: Rude variant of Tasks RCU enabled. May 10 00:42:31.922620 kernel: Tracing variant of Tasks RCU enabled. May 10 00:42:31.922628 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:42:31.922635 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 10 00:42:31.922642 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 10 00:42:31.922648 kernel: random: crng init done May 10 00:42:31.922655 kernel: Console: colour VGA+ 80x25 May 10 00:42:31.922661 kernel: printk: console [ttyS0] enabled May 10 00:42:31.922668 kernel: ACPI: Core revision 20210730 May 10 00:42:31.922675 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 10 00:42:31.922682 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:42:31.922689 kernel: x2apic enabled May 10 00:42:31.922696 kernel: Switched APIC routing to physical x2apic. May 10 00:42:31.922705 kernel: kvm-guest: setup PV IPIs May 10 00:42:31.922712 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 10 00:42:31.922719 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 10 00:42:31.922727 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 10 00:42:31.922734 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 10 00:42:31.922741 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 10 00:42:31.922748 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 10 00:42:31.922761 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:42:31.922768 kernel: Spectre V2 : Mitigation: Retpolines May 10 00:42:31.922775 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:42:31.922784 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 10 00:42:31.922791 kernel: RETBleed: Mitigation: untrained return thunk May 10 00:42:31.922798 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 10 00:42:31.922814 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 10 00:42:31.922821 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:42:31.922828 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:42:31.922838 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:42:31.922845 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:42:31.922852 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 10 00:42:31.922859 kernel: Freeing SMP alternatives memory: 32K May 10 00:42:31.922866 kernel: pid_max: default: 32768 minimum: 301 May 10 00:42:31.922873 kernel: LSM: Security Framework initializing May 10 00:42:31.922880 kernel: SELinux: Initializing. May 10 00:42:31.922888 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 10 00:42:31.922895 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 10 00:42:31.922903 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 10 00:42:31.922910 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 10 00:42:31.922917 kernel: ... version: 0 May 10 00:42:31.922924 kernel: ... bit width: 48 May 10 00:42:31.922931 kernel: ... generic registers: 6 May 10 00:42:31.922938 kernel: ... value mask: 0000ffffffffffff May 10 00:42:31.922945 kernel: ... max period: 00007fffffffffff May 10 00:42:31.922953 kernel: ... fixed-purpose events: 0 May 10 00:42:31.922960 kernel: ... event mask: 000000000000003f May 10 00:42:31.922967 kernel: signal: max sigframe size: 1776 May 10 00:42:31.922974 kernel: rcu: Hierarchical SRCU implementation. May 10 00:42:31.922981 kernel: smp: Bringing up secondary CPUs ... May 10 00:42:31.922988 kernel: x86: Booting SMP configuration: May 10 00:42:31.922995 kernel: .... node #0, CPUs: #1 May 10 00:42:31.923002 kernel: kvm-clock: cpu 1, msr 21196041, secondary cpu clock May 10 00:42:31.923009 kernel: kvm-guest: setup async PF for cpu 1 May 10 00:42:31.923016 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 May 10 00:42:31.923024 kernel: #2 May 10 00:42:31.923031 kernel: kvm-clock: cpu 2, msr 21196081, secondary cpu clock May 10 00:42:31.923038 kernel: kvm-guest: setup async PF for cpu 2 May 10 00:42:31.923045 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 May 10 00:42:31.923052 kernel: #3 May 10 00:42:31.923061 kernel: kvm-clock: cpu 3, msr 211960c1, secondary cpu clock May 10 00:42:31.923068 kernel: kvm-guest: setup async PF for cpu 3 May 10 00:42:31.923075 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 May 10 00:42:31.923082 kernel: smp: Brought up 1 node, 4 CPUs May 10 00:42:31.923091 kernel: smpboot: Max logical packages: 1 May 10 00:42:31.923098 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 10 00:42:31.923105 kernel: devtmpfs: initialized May 10 00:42:31.923111 kernel: x86/mm: Memory block size: 128MB May 10 00:42:31.923119 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:42:31.923126 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 10 00:42:31.923133 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:42:31.923140 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:42:31.923147 kernel: audit: initializing netlink subsys (disabled) May 10 00:42:31.923156 kernel: audit: type=2000 audit(1746837751.656:1): state=initialized audit_enabled=0 res=1 May 10 00:42:31.923163 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:42:31.923170 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:42:31.923177 kernel: cpuidle: using governor menu May 10 00:42:31.923184 kernel: ACPI: bus type PCI registered May 10 00:42:31.923191 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:42:31.923198 kernel: dca service started, version 1.12.1 May 10 00:42:31.923205 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 10 00:42:31.923212 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 10 00:42:31.923221 kernel: PCI: Using configuration type 1 for base access May 10 00:42:31.923228 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:42:31.923236 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 00:42:31.923243 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:42:31.923250 kernel: ACPI: Added _OSI(Module Device) May 10 00:42:31.923257 kernel: ACPI: Added _OSI(Processor Device) May 10 00:42:31.923264 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:42:31.923271 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:42:31.923278 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:42:31.923286 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:42:31.923293 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:42:31.923300 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 10 00:42:31.923307 kernel: ACPI: Interpreter enabled May 10 00:42:31.923314 kernel: ACPI: PM: (supports S0 S3 S5) May 10 00:42:31.923321 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:42:31.923329 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:42:31.923336 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 10 00:42:31.923343 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 00:42:31.923491 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 10 00:42:31.923588 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 10 00:42:31.923666 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 10 00:42:31.923675 kernel: PCI host bridge to bus 0000:00 May 10 00:42:31.923758 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 00:42:31.923836 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 00:42:31.923907 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 00:42:31.923976 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 10 00:42:31.924131 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 10 00:42:31.924278 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] May 10 00:42:31.924432 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 00:42:31.924564 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 10 00:42:31.924651 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 10 00:42:31.924735 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] May 10 00:42:31.924819 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] May 10 00:42:31.924894 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] May 10 00:42:31.924967 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 10 00:42:31.925050 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 10 00:42:31.925126 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] May 10 00:42:31.925206 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] May 10 00:42:31.925306 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] May 10 00:42:31.925398 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 10 00:42:31.925477 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] May 10 00:42:31.925577 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] May 10 00:42:31.925653 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] May 10 00:42:31.925734 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 10 00:42:31.925843 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] May 10 00:42:31.925919 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] May 10 00:42:31.925993 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] May 10 00:42:31.926067 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] May 10 00:42:31.926146 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 10 00:42:31.926220 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 10 00:42:31.926299 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 10 00:42:31.926397 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] May 10 00:42:31.926473 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] May 10 00:42:31.926568 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 10 00:42:31.926645 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] May 10 00:42:31.926655 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 00:42:31.926662 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 00:42:31.926670 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 00:42:31.926678 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 00:42:31.926696 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 10 00:42:31.926704 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 10 00:42:31.926711 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 10 00:42:31.926718 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 10 00:42:31.926726 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 10 00:42:31.926733 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 10 00:42:31.926741 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 10 00:42:31.926748 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 10 00:42:31.926755 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 10 00:42:31.926768 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 10 00:42:31.926776 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 10 00:42:31.926783 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 10 00:42:31.926790 kernel: iommu: Default domain type: Translated May 10 00:42:31.926798 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:42:31.926884 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 10 00:42:31.926958 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 10 00:42:31.927032 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 10 00:42:31.927052 kernel: vgaarb: loaded May 10 00:42:31.927059 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:42:31.927067 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:42:31.927074 kernel: PTP clock support registered May 10 00:42:31.927081 kernel: PCI: Using ACPI for IRQ routing May 10 00:42:31.927089 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 00:42:31.927097 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 10 00:42:31.927107 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] May 10 00:42:31.927116 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 10 00:42:31.927134 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 10 00:42:31.927144 kernel: clocksource: Switched to clocksource kvm-clock May 10 00:42:31.927152 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:42:31.927160 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:42:31.927167 kernel: pnp: PnP ACPI init May 10 00:42:31.927264 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 10 00:42:31.927276 kernel: pnp: PnP ACPI: found 6 devices May 10 00:42:31.927283 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:42:31.927300 kernel: NET: Registered PF_INET protocol family May 10 00:42:31.927307 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 10 00:42:31.927315 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 10 00:42:31.927323 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:42:31.927330 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 10 00:42:31.927340 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 10 00:42:31.927350 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 10 00:42:31.927360 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 10 00:42:31.927369 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 10 00:42:31.927385 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:42:31.927393 kernel: NET: Registered PF_XDP protocol family May 10 00:42:31.927470 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 00:42:31.927538 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 00:42:31.927619 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 00:42:31.927685 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 10 00:42:31.927751 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 10 00:42:31.927826 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] May 10 00:42:31.927846 kernel: PCI: CLS 0 bytes, default 64 May 10 00:42:31.927854 kernel: Initialise system trusted keyrings May 10 00:42:31.927862 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 10 00:42:31.927869 kernel: Key type asymmetric registered May 10 00:42:31.927876 kernel: Asymmetric key parser 'x509' registered May 10 00:42:31.927884 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:42:31.927891 kernel: io scheduler mq-deadline registered May 10 00:42:31.927898 kernel: io scheduler kyber registered May 10 00:42:31.927906 kernel: io scheduler bfq registered May 10 00:42:31.927913 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:42:31.927927 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 10 00:42:31.927935 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 10 00:42:31.927942 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 10 00:42:31.927950 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:42:31.927957 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:42:31.927965 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 00:42:31.927972 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 00:42:31.927979 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 00:42:31.928058 kernel: rtc_cmos 00:04: RTC can wake from S4 May 10 00:42:31.928077 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 00:42:31.928147 kernel: rtc_cmos 00:04: registered as rtc0 May 10 00:42:31.928215 kernel: rtc_cmos 00:04: setting system clock to 2025-05-10T00:42:31 UTC (1746837751) May 10 00:42:31.928284 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 10 00:42:31.928293 kernel: NET: Registered PF_INET6 protocol family May 10 00:42:31.928301 kernel: Segment Routing with IPv6 May 10 00:42:31.928308 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:42:31.928315 kernel: NET: Registered PF_PACKET protocol family May 10 00:42:31.928335 kernel: Key type dns_resolver registered May 10 00:42:31.928344 kernel: IPI shorthand broadcast: enabled May 10 00:42:31.928354 kernel: sched_clock: Marking stable (449179201, 117800663)->(627907585, -60927721) May 10 00:42:31.928363 kernel: registered taskstats version 1 May 10 00:42:31.928372 kernel: Loading compiled-in X.509 certificates May 10 00:42:31.928382 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:42:31.928392 kernel: Key type .fscrypt registered May 10 00:42:31.928401 kernel: Key type fscrypt-provisioning registered May 10 00:42:31.928410 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 00:42:31.928432 kernel: ima: Allocated hash algorithm: sha1 May 10 00:42:31.928440 kernel: ima: No architecture policies found May 10 00:42:31.928450 kernel: clk: Disabling unused clocks May 10 00:42:31.928460 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:42:31.928469 kernel: Write protecting the kernel read-only data: 28672k May 10 00:42:31.928476 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:42:31.928484 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:42:31.928491 kernel: Run /init as init process May 10 00:42:31.928509 kernel: with arguments: May 10 00:42:31.928516 kernel: /init May 10 00:42:31.928523 kernel: with environment: May 10 00:42:31.928530 kernel: HOME=/ May 10 00:42:31.928537 kernel: TERM=linux May 10 00:42:31.928556 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:42:31.928567 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:42:31.928577 systemd[1]: Detected virtualization kvm. May 10 00:42:31.928593 systemd[1]: Detected architecture x86-64. May 10 00:42:31.928600 systemd[1]: Running in initrd. May 10 00:42:31.928608 systemd[1]: No hostname configured, using default hostname. May 10 00:42:31.928616 systemd[1]: Hostname set to . May 10 00:42:31.928624 systemd[1]: Initializing machine ID from VM UUID. May 10 00:42:31.928632 systemd[1]: Queued start job for default target initrd.target. May 10 00:42:31.928639 systemd[1]: Started systemd-ask-password-console.path. May 10 00:42:31.928647 systemd[1]: Reached target cryptsetup.target. May 10 00:42:31.928655 systemd[1]: Reached target paths.target. May 10 00:42:31.928669 systemd[1]: Reached target slices.target. May 10 00:42:31.928721 systemd[1]: Reached target swap.target. May 10 00:42:31.928739 systemd[1]: Reached target timers.target. May 10 00:42:31.928750 systemd[1]: Listening on iscsid.socket. May 10 00:42:31.928760 systemd[1]: Listening on iscsiuio.socket. May 10 00:42:31.928780 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:42:31.928790 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:42:31.928808 systemd[1]: Listening on systemd-journald.socket. May 10 00:42:31.928818 systemd[1]: Listening on systemd-networkd.socket. May 10 00:42:31.928829 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:42:31.928841 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:42:31.928852 systemd[1]: Reached target sockets.target. May 10 00:42:31.928862 systemd[1]: Starting kmod-static-nodes.service... May 10 00:42:31.928872 systemd[1]: Finished network-cleanup.service. May 10 00:42:31.928893 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:42:31.928904 systemd[1]: Starting systemd-journald.service... May 10 00:42:31.928914 systemd[1]: Starting systemd-modules-load.service... May 10 00:42:31.928925 systemd[1]: Starting systemd-resolved.service... May 10 00:42:31.928935 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:42:31.928945 systemd[1]: Finished kmod-static-nodes.service. May 10 00:42:31.928970 systemd-journald[199]: Journal started May 10 00:42:31.929044 systemd-journald[199]: Runtime Journal (/run/log/journal/8359fb03c972460f8a040f29912a1941) is 6.0M, max 48.5M, 42.5M free. May 10 00:42:31.928742 systemd-modules-load[200]: Inserted module 'overlay' May 10 00:42:31.962058 kernel: audit: type=1130 audit(1746837751.952:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:31.962102 systemd[1]: Started systemd-journald.service. May 10 00:42:31.962115 kernel: audit: type=1130 audit(1746837751.956:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:31.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:31.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:31.942142 systemd-resolved[201]: Positive Trust Anchors: May 10 00:42:31.966737 kernel: audit: type=1130 audit(1746837751.962:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:31.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:31.942159 systemd-resolved[201]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:42:31.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:31.942187 systemd-resolved[201]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:42:31.975651 kernel: audit: type=1130 audit(1746837751.966:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:31.975677 kernel: audit: type=1130 audit(1746837751.970:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:31.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:31.944369 systemd-resolved[201]: Defaulting to hostname 'linux'. May 10 00:42:31.957334 systemd[1]: Started systemd-resolved.service. May 10 00:42:31.963215 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:42:31.967707 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:42:31.971289 systemd[1]: Reached target nss-lookup.target. May 10 00:42:31.982913 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:42:31.984283 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:42:31.992567 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:42:31.993325 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:42:31.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:31.997590 kernel: audit: type=1130 audit(1746837751.992:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:32.002345 systemd-modules-load[200]: Inserted module 'br_netfilter' May 10 00:42:32.003257 kernel: Bridge firewalling registered May 10 00:42:32.006415 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:42:32.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:32.009109 systemd[1]: Starting dracut-cmdline.service... May 10 00:42:32.013478 kernel: audit: type=1130 audit(1746837752.007:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:32.017639 dracut-cmdline[218]: dracut-dracut-053 May 10 00:42:32.020391 dracut-cmdline[218]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:42:32.028579 kernel: SCSI subsystem initialized May 10 00:42:32.041057 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:42:32.041110 kernel: device-mapper: uevent: version 1.0.3 May 10 00:42:32.041140 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:42:32.045320 systemd-modules-load[200]: Inserted module 'dm_multipath' May 10 00:42:32.047246 systemd[1]: Finished systemd-modules-load.service. May 10 00:42:32.052118 kernel: audit: type=1130 audit(1746837752.047:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:32.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:32.052160 systemd[1]: Starting systemd-sysctl.service... May 10 00:42:32.060517 systemd[1]: Finished systemd-sysctl.service. May 10 00:42:32.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:32.065606 kernel: audit: type=1130 audit(1746837752.061:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:32.099593 kernel: Loading iSCSI transport class v2.0-870. May 10 00:42:32.115588 kernel: iscsi: registered transport (tcp) May 10 00:42:32.137639 kernel: iscsi: registered transport (qla4xxx) May 10 00:42:32.137714 kernel: QLogic iSCSI HBA Driver May 10 00:42:32.176210 systemd[1]: Finished dracut-cmdline.service. May 10 00:42:32.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:32.177274 systemd[1]: Starting dracut-pre-udev.service... May 10 00:42:32.227583 kernel: raid6: avx2x4 gen() 30007 MB/s May 10 00:42:32.244563 kernel: raid6: avx2x4 xor() 7041 MB/s May 10 00:42:32.261565 kernel: raid6: avx2x2 gen() 30931 MB/s May 10 00:42:32.278570 kernel: raid6: avx2x2 xor() 19054 MB/s May 10 00:42:32.295565 kernel: raid6: avx2x1 gen() 26201 MB/s May 10 00:42:32.312572 kernel: raid6: avx2x1 xor() 15141 MB/s May 10 00:42:32.329594 kernel: raid6: sse2x4 gen() 14537 MB/s May 10 00:42:32.346601 kernel: raid6: sse2x4 xor() 7139 MB/s May 10 00:42:32.363582 kernel: raid6: sse2x2 gen() 16050 MB/s May 10 00:42:32.380570 kernel: raid6: sse2x2 xor() 9615 MB/s May 10 00:42:32.397569 kernel: raid6: sse2x1 gen() 11679 MB/s May 10 00:42:32.414984 kernel: raid6: sse2x1 xor() 7631 MB/s May 10 00:42:32.415010 kernel: raid6: using algorithm avx2x2 gen() 30931 MB/s May 10 00:42:32.415024 kernel: raid6: .... xor() 19054 MB/s, rmw enabled May 10 00:42:32.416565 kernel: raid6: using avx2x2 recovery algorithm May 10 00:42:32.428570 kernel: xor: automatically using best checksumming function avx May 10 00:42:32.518580 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:42:32.528390 systemd[1]: Finished dracut-pre-udev.service. May 10 00:42:32.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:32.529000 audit: BPF prog-id=7 op=LOAD May 10 00:42:32.529000 audit: BPF prog-id=8 op=LOAD May 10 00:42:32.530612 systemd[1]: Starting systemd-udevd.service... May 10 00:42:32.545266 systemd-udevd[401]: Using default interface naming scheme 'v252'. May 10 00:42:32.549266 systemd[1]: Started systemd-udevd.service. May 10 00:42:32.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:32.550109 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:42:32.560876 dracut-pre-trigger[405]: rd.md=0: removing MD RAID activation May 10 00:42:32.588536 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:42:32.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:32.590399 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:42:32.625485 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:42:32.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:32.657937 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 10 00:42:32.664621 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 00:42:32.664640 kernel: GPT:9289727 != 19775487 May 10 00:42:32.664652 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 00:42:32.664665 kernel: GPT:9289727 != 19775487 May 10 00:42:32.664677 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 00:42:32.664709 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:42:32.669626 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:42:32.669652 kernel: libata version 3.00 loaded. May 10 00:42:32.678076 kernel: ahci 0000:00:1f.2: version 3.0 May 10 00:42:32.705893 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 10 00:42:32.705911 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 10 00:42:32.706007 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 10 00:42:32.706087 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:42:32.706117 kernel: AES CTR mode by8 optimization enabled May 10 00:42:32.706127 kernel: scsi host0: ahci May 10 00:42:32.706222 kernel: scsi host1: ahci May 10 00:42:32.706312 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (444) May 10 00:42:32.706322 kernel: scsi host2: ahci May 10 00:42:32.706406 kernel: scsi host3: ahci May 10 00:42:32.706491 kernel: scsi host4: ahci May 10 00:42:32.706603 kernel: scsi host5: ahci May 10 00:42:32.706693 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 May 10 00:42:32.706702 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 May 10 00:42:32.706711 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 May 10 00:42:32.706720 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 May 10 00:42:32.706729 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 May 10 00:42:32.706737 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 May 10 00:42:32.692854 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:42:32.734471 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:42:32.745252 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:42:32.750717 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:42:32.754503 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:42:32.756172 systemd[1]: Starting disk-uuid.service... May 10 00:42:32.765589 disk-uuid[527]: Primary Header is updated. May 10 00:42:32.765589 disk-uuid[527]: Secondary Entries is updated. May 10 00:42:32.765589 disk-uuid[527]: Secondary Header is updated. May 10 00:42:32.769562 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:42:32.771573 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:42:32.774558 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:42:33.014441 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 10 00:42:33.014517 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 10 00:42:33.014529 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 10 00:42:33.014583 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 10 00:42:33.017577 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 10 00:42:33.017603 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 10 00:42:33.018575 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 10 00:42:33.018593 kernel: ata3.00: applying bridge limits May 10 00:42:33.019802 kernel: ata3.00: configured for UDMA/100 May 10 00:42:33.020562 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 10 00:42:33.050944 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 10 00:42:33.068106 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 10 00:42:33.068125 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 10 00:42:33.792577 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:42:33.792633 disk-uuid[528]: The operation has completed successfully. May 10 00:42:33.816897 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:42:33.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.816984 systemd[1]: Finished disk-uuid.service. May 10 00:42:33.823101 systemd[1]: Starting verity-setup.service... May 10 00:42:33.835573 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 10 00:42:33.854841 systemd[1]: Found device dev-mapper-usr.device. May 10 00:42:33.856460 systemd[1]: Mounting sysusr-usr.mount... May 10 00:42:33.858476 systemd[1]: Finished verity-setup.service. May 10 00:42:33.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.915565 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:42:33.916102 systemd[1]: Mounted sysusr-usr.mount. May 10 00:42:33.916282 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:42:33.917057 systemd[1]: Starting ignition-setup.service... May 10 00:42:33.918966 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:42:33.927212 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:42:33.927235 kernel: BTRFS info (device vda6): using free space tree May 10 00:42:33.927245 kernel: BTRFS info (device vda6): has skinny extents May 10 00:42:33.935801 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:42:33.948053 systemd[1]: Finished ignition-setup.service. May 10 00:42:33.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.949862 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:42:33.990373 ignition[647]: Ignition 2.14.0 May 10 00:42:33.990387 ignition[647]: Stage: fetch-offline May 10 00:42:33.990469 ignition[647]: no configs at "/usr/lib/ignition/base.d" May 10 00:42:33.992658 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:42:33.990479 ignition[647]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:42:33.990597 ignition[647]: parsed url from cmdline: "" May 10 00:42:33.990600 ignition[647]: no config URL provided May 10 00:42:33.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:33.996000 audit: BPF prog-id=9 op=LOAD May 10 00:42:33.990605 ignition[647]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:42:33.997659 systemd[1]: Starting systemd-networkd.service... May 10 00:42:33.990612 ignition[647]: no config at "/usr/lib/ignition/user.ign" May 10 00:42:33.990628 ignition[647]: op(1): [started] loading QEMU firmware config module May 10 00:42:33.990632 ignition[647]: op(1): executing: "modprobe" "qemu_fw_cfg" May 10 00:42:33.994812 ignition[647]: op(1): [finished] loading QEMU firmware config module May 10 00:42:34.040665 ignition[647]: parsing config with SHA512: 05573b917ebb39fd72c4cce38856c0fe8cb93c616ad8b6666d81be60d4e983393b8b0ea84068cfc4853a67def14ab44f88a00d8de9461ed75d4d2e08625e2d2e May 10 00:42:34.048784 unknown[647]: fetched base config from "system" May 10 00:42:34.048798 unknown[647]: fetched user config from "qemu" May 10 00:42:34.050908 ignition[647]: fetch-offline: fetch-offline passed May 10 00:42:34.050980 ignition[647]: Ignition finished successfully May 10 00:42:34.053846 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:42:34.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.064274 systemd-networkd[720]: lo: Link UP May 10 00:42:34.064283 systemd-networkd[720]: lo: Gained carrier May 10 00:42:34.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.064732 systemd-networkd[720]: Enumeration completed May 10 00:42:34.064857 systemd[1]: Started systemd-networkd.service. May 10 00:42:34.064989 systemd-networkd[720]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:42:34.066167 systemd-networkd[720]: eth0: Link UP May 10 00:42:34.066170 systemd-networkd[720]: eth0: Gained carrier May 10 00:42:34.066709 systemd[1]: Reached target network.target. May 10 00:42:34.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.068615 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 10 00:42:34.069588 systemd[1]: Starting ignition-kargs.service... May 10 00:42:34.080506 ignition[722]: Ignition 2.14.0 May 10 00:42:34.071784 systemd[1]: Starting iscsiuio.service... May 10 00:42:34.080512 ignition[722]: Stage: kargs May 10 00:42:34.076774 systemd[1]: Started iscsiuio.service. May 10 00:42:34.080679 ignition[722]: no configs at "/usr/lib/ignition/base.d" May 10 00:42:34.078797 systemd[1]: Starting iscsid.service... May 10 00:42:34.080690 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:42:34.082649 systemd-networkd[720]: eth0: DHCPv4 address 10.0.0.88/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 10 00:42:34.081906 ignition[722]: kargs: kargs passed May 10 00:42:34.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.087860 systemd[1]: Finished ignition-kargs.service. May 10 00:42:34.081952 ignition[722]: Ignition finished successfully May 10 00:42:34.091430 systemd[1]: Starting ignition-disks.service... May 10 00:42:34.094625 iscsid[733]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:42:34.094625 iscsid[733]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:42:34.094625 iscsid[733]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:42:34.094625 iscsid[733]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:42:34.094625 iscsid[733]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:42:34.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.098021 ignition[734]: Ignition 2.14.0 May 10 00:42:34.099800 systemd[1]: Finished ignition-disks.service. May 10 00:42:34.109334 iscsid[733]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:42:34.098028 ignition[734]: Stage: disks May 10 00:42:34.101437 systemd[1]: Reached target initrd-root-device.target. May 10 00:42:34.098130 ignition[734]: no configs at "/usr/lib/ignition/base.d" May 10 00:42:34.103962 systemd[1]: Reached target local-fs-pre.target. May 10 00:42:34.098141 ignition[734]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:42:34.105118 systemd[1]: Reached target local-fs.target. May 10 00:42:34.099139 ignition[734]: disks: disks passed May 10 00:42:34.107998 systemd[1]: Reached target sysinit.target. May 10 00:42:34.099174 ignition[734]: Ignition finished successfully May 10 00:42:34.109287 systemd[1]: Reached target basic.target. May 10 00:42:34.120071 systemd[1]: Started iscsid.service. May 10 00:42:34.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.120854 systemd[1]: Starting dracut-initqueue.service... May 10 00:42:34.129054 systemd[1]: Finished dracut-initqueue.service. May 10 00:42:34.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.129165 systemd[1]: Reached target remote-fs-pre.target. May 10 00:42:34.131599 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:42:34.133427 systemd[1]: Reached target remote-fs.target. May 10 00:42:34.135826 systemd[1]: Starting dracut-pre-mount.service... May 10 00:42:34.142045 systemd[1]: Finished dracut-pre-mount.service. May 10 00:42:34.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.142634 systemd[1]: Starting systemd-fsck-root.service... May 10 00:42:34.154316 systemd-fsck[755]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 10 00:42:34.232380 systemd[1]: Finished systemd-fsck-root.service. May 10 00:42:34.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.233214 systemd[1]: Mounting sysroot.mount... May 10 00:42:34.241582 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:42:34.242144 systemd[1]: Mounted sysroot.mount. May 10 00:42:34.242314 systemd[1]: Reached target initrd-root-fs.target. May 10 00:42:34.245599 systemd[1]: Mounting sysroot-usr.mount... May 10 00:42:34.247062 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 10 00:42:34.247091 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:42:34.247111 systemd[1]: Reached target ignition-diskful.target. May 10 00:42:34.249757 systemd[1]: Mounted sysroot-usr.mount. May 10 00:42:34.251859 systemd[1]: Starting initrd-setup-root.service... May 10 00:42:34.257082 initrd-setup-root[765]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:42:34.262353 initrd-setup-root[773]: cut: /sysroot/etc/group: No such file or directory May 10 00:42:34.266811 initrd-setup-root[781]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:42:34.271534 initrd-setup-root[789]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:42:34.298339 systemd[1]: Finished initrd-setup-root.service. May 10 00:42:34.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.300853 systemd[1]: Starting ignition-mount.service... May 10 00:42:34.302962 systemd[1]: Starting sysroot-boot.service... May 10 00:42:34.307081 bash[806]: umount: /sysroot/usr/share/oem: not mounted. May 10 00:42:34.316890 ignition[807]: INFO : Ignition 2.14.0 May 10 00:42:34.318126 ignition[807]: INFO : Stage: mount May 10 00:42:34.318126 ignition[807]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:42:34.318126 ignition[807]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:42:34.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:34.319106 systemd[1]: Finished ignition-mount.service. May 10 00:42:34.325661 ignition[807]: INFO : mount: mount passed May 10 00:42:34.325661 ignition[807]: INFO : Ignition finished successfully May 10 00:42:34.322580 systemd[1]: Finished sysroot-boot.service. May 10 00:42:34.866066 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:42:34.873173 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (816) May 10 00:42:34.873200 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:42:34.873209 kernel: BTRFS info (device vda6): using free space tree May 10 00:42:34.873984 kernel: BTRFS info (device vda6): has skinny extents May 10 00:42:34.877943 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:42:34.880314 systemd[1]: Starting ignition-files.service... May 10 00:42:34.894292 ignition[836]: INFO : Ignition 2.14.0 May 10 00:42:34.894292 ignition[836]: INFO : Stage: files May 10 00:42:34.896093 ignition[836]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:42:34.896093 ignition[836]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:42:34.896093 ignition[836]: DEBUG : files: compiled without relabeling support, skipping May 10 00:42:34.899922 ignition[836]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:42:34.899922 ignition[836]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:42:34.899922 ignition[836]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:42:34.899922 ignition[836]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:42:34.899922 ignition[836]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:42:34.899387 unknown[836]: wrote ssh authorized keys file for user: core May 10 00:42:34.908152 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 10 00:42:34.908152 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 May 10 00:42:35.025680 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 10 00:42:35.229701 systemd-networkd[720]: eth0: Gained IPv6LL May 10 00:42:35.294503 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 10 00:42:35.294503 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 10 00:42:35.298707 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:42:35.298707 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 10 00:42:35.298707 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 10 00:42:35.298707 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:42:35.298707 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:42:35.298707 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:42:35.298707 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:42:35.298707 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:42:35.298707 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:42:35.298707 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:42:35.298707 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:42:35.298707 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:42:35.298707 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 May 10 00:42:35.637834 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 10 00:42:36.037112 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:42:36.037112 ignition[836]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 10 00:42:36.041560 ignition[836]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:42:36.041560 ignition[836]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:42:36.041560 ignition[836]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 10 00:42:36.041560 ignition[836]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 10 00:42:36.041560 ignition[836]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 10 00:42:36.041560 ignition[836]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 10 00:42:36.041560 ignition[836]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 10 00:42:36.041560 ignition[836]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 10 00:42:36.041560 ignition[836]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 10 00:42:36.041560 ignition[836]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 10 00:42:36.041560 ignition[836]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 10 00:42:36.071295 ignition[836]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 10 00:42:36.073290 ignition[836]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 10 00:42:36.073290 ignition[836]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:42:36.073290 ignition[836]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:42:36.073290 ignition[836]: INFO : files: files passed May 10 00:42:36.073290 ignition[836]: INFO : Ignition finished successfully May 10 00:42:36.082072 systemd[1]: Finished ignition-files.service. May 10 00:42:36.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.084263 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:42:36.085506 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:42:36.086302 systemd[1]: Starting ignition-quench.service... May 10 00:42:36.089842 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:42:36.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.089928 systemd[1]: Finished ignition-quench.service. May 10 00:42:36.094693 initrd-setup-root-after-ignition[862]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 10 00:42:36.098025 initrd-setup-root-after-ignition[864]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:42:36.098644 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:42:36.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.101060 systemd[1]: Reached target ignition-complete.target. May 10 00:42:36.103780 systemd[1]: Starting initrd-parse-etc.service... May 10 00:42:36.118844 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:42:36.118934 systemd[1]: Finished initrd-parse-etc.service. May 10 00:42:36.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.120049 systemd[1]: Reached target initrd-fs.target. May 10 00:42:36.122236 systemd[1]: Reached target initrd.target. May 10 00:42:36.123814 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:42:36.124499 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:42:36.135398 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:42:36.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.136351 systemd[1]: Starting initrd-cleanup.service... May 10 00:42:36.145685 systemd[1]: Stopped target nss-lookup.target. May 10 00:42:36.145826 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:42:36.148521 systemd[1]: Stopped target timers.target. May 10 00:42:36.149463 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:42:36.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.149634 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:42:36.151971 systemd[1]: Stopped target initrd.target. May 10 00:42:36.153713 systemd[1]: Stopped target basic.target. May 10 00:42:36.154597 systemd[1]: Stopped target ignition-complete.target. May 10 00:42:36.156027 systemd[1]: Stopped target ignition-diskful.target. May 10 00:42:36.158529 systemd[1]: Stopped target initrd-root-device.target. May 10 00:42:36.161093 systemd[1]: Stopped target remote-fs.target. May 10 00:42:36.162870 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:42:36.164571 systemd[1]: Stopped target sysinit.target. May 10 00:42:36.165522 systemd[1]: Stopped target local-fs.target. May 10 00:42:36.166895 systemd[1]: Stopped target local-fs-pre.target. May 10 00:42:36.168337 systemd[1]: Stopped target swap.target. May 10 00:42:36.190410 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:42:36.196773 kernel: kauditd_printk_skb: 33 callbacks suppressed May 10 00:42:36.196800 kernel: audit: type=1131 audit(1746837756.191:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.190594 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:42:36.192198 systemd[1]: Stopped target cryptsetup.target. May 10 00:42:36.216870 kernel: audit: type=1131 audit(1746837756.212:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.211625 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:42:36.221933 kernel: audit: type=1131 audit(1746837756.217:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.211753 systemd[1]: Stopped dracut-initqueue.service. May 10 00:42:36.213343 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:42:36.213461 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:42:36.218010 systemd[1]: Stopped target paths.target. May 10 00:42:36.222789 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:42:36.227586 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:42:36.227758 systemd[1]: Stopped target slices.target. May 10 00:42:36.230226 systemd[1]: Stopped target sockets.target. May 10 00:42:36.231001 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:42:36.237509 kernel: audit: type=1131 audit(1746837756.231:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.231125 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:42:36.242470 kernel: audit: type=1131 audit(1746837756.237:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.232485 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:42:36.232611 systemd[1]: Stopped ignition-files.service. May 10 00:42:36.239436 systemd[1]: Stopping ignition-mount.service... May 10 00:42:36.252594 kernel: audit: type=1131 audit(1746837756.248:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.252669 ignition[877]: INFO : Ignition 2.14.0 May 10 00:42:36.252669 ignition[877]: INFO : Stage: umount May 10 00:42:36.252669 ignition[877]: INFO : no configs at "/usr/lib/ignition/base.d" May 10 00:42:36.252669 ignition[877]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 10 00:42:36.252669 ignition[877]: INFO : umount: umount passed May 10 00:42:36.252669 ignition[877]: INFO : Ignition finished successfully May 10 00:42:36.272678 kernel: audit: type=1131 audit(1746837756.252:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.272714 kernel: audit: type=1131 audit(1746837756.257:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.272726 kernel: audit: type=1131 audit(1746837756.261:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.272736 kernel: audit: type=1131 audit(1746837756.264:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.272912 iscsid[733]: iscsid shutting down. May 10 00:42:36.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.243454 systemd[1]: Stopping iscsid.service... May 10 00:42:36.245746 systemd[1]: Stopping sysroot-boot.service... May 10 00:42:36.246926 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:42:36.247072 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:42:36.248760 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:42:36.248842 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:42:36.254057 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:42:36.254135 systemd[1]: Stopped ignition-mount.service. May 10 00:42:36.258763 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:42:36.258857 systemd[1]: Stopped ignition-disks.service. May 10 00:42:36.261695 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:42:36.261738 systemd[1]: Stopped ignition-kargs.service. May 10 00:42:36.265199 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:42:36.265236 systemd[1]: Stopped ignition-setup.service. May 10 00:42:36.271385 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:42:36.271456 systemd[1]: Finished initrd-cleanup.service. May 10 00:42:36.286477 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:42:36.290008 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:42:36.290932 systemd[1]: Stopped iscsid.service. May 10 00:42:36.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.293120 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:42:36.293152 systemd[1]: Closed iscsid.socket. May 10 00:42:36.295357 systemd[1]: Stopping iscsiuio.service... May 10 00:42:36.298675 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:42:36.298762 systemd[1]: Stopped iscsiuio.service. May 10 00:42:36.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.301110 systemd[1]: Stopped target network.target. May 10 00:42:36.302694 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:42:36.302738 systemd[1]: Closed iscsiuio.socket. May 10 00:42:36.305029 systemd[1]: Stopping systemd-networkd.service... May 10 00:42:36.306856 systemd[1]: Stopping systemd-resolved.service... May 10 00:42:36.309594 systemd-networkd[720]: eth0: DHCPv6 lease lost May 10 00:42:36.310815 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:42:36.311882 systemd[1]: Stopped systemd-networkd.service. May 10 00:42:36.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.314246 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:42:36.314278 systemd[1]: Closed systemd-networkd.socket. May 10 00:42:36.316000 audit: BPF prog-id=9 op=UNLOAD May 10 00:42:36.318444 systemd[1]: Stopping network-cleanup.service... May 10 00:42:36.320114 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:42:36.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.320159 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:42:36.322141 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:42:36.322182 systemd[1]: Stopped systemd-sysctl.service. May 10 00:42:36.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.325475 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:42:36.325514 systemd[1]: Stopped systemd-modules-load.service. May 10 00:42:36.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.328369 systemd[1]: Stopping systemd-udevd.service... May 10 00:42:36.330721 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:42:36.332285 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:42:36.333300 systemd[1]: Stopped systemd-resolved.service. May 10 00:42:36.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.335671 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:42:36.336729 systemd[1]: Stopped systemd-udevd.service. May 10 00:42:36.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.338000 audit: BPF prog-id=6 op=UNLOAD May 10 00:42:36.339277 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:42:36.339322 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:42:36.341343 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:42:36.342168 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:42:36.345064 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:42:36.345108 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:42:36.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.347742 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:42:36.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.347775 systemd[1]: Stopped dracut-cmdline.service. May 10 00:42:36.349573 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:42:36.349607 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:42:36.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.353658 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:42:36.354605 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 10 00:42:36.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.355534 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 10 00:42:36.358885 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:42:36.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.358920 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:42:36.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.360962 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:42:36.360996 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:42:36.365228 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 10 00:42:36.367081 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:42:36.368164 systemd[1]: Stopped network-cleanup.service. May 10 00:42:36.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.369979 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:42:36.370047 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:42:36.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.415186 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:42:36.415317 systemd[1]: Stopped sysroot-boot.service. May 10 00:42:36.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.418356 systemd[1]: Reached target initrd-switch-root.target. May 10 00:42:36.420456 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:42:36.420508 systemd[1]: Stopped initrd-setup-root.service. May 10 00:42:36.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:36.424337 systemd[1]: Starting initrd-switch-root.service... May 10 00:42:36.437294 systemd[1]: Switching root. May 10 00:42:36.455705 systemd-journald[199]: Journal stopped May 10 00:42:39.411400 systemd-journald[199]: Received SIGTERM from PID 1 (n/a). May 10 00:42:39.411482 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:42:39.411496 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:42:39.411506 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:42:39.411572 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:42:39.411606 kernel: SELinux: policy capability open_perms=1 May 10 00:42:39.411617 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:42:39.411640 kernel: SELinux: policy capability always_check_network=0 May 10 00:42:39.411649 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:42:39.411659 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:42:39.411668 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:42:39.411678 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:42:39.411694 systemd[1]: Successfully loaded SELinux policy in 38.071ms. May 10 00:42:39.411714 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.860ms. May 10 00:42:39.411736 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:42:39.411747 systemd[1]: Detected virtualization kvm. May 10 00:42:39.411757 systemd[1]: Detected architecture x86-64. May 10 00:42:39.411768 systemd[1]: Detected first boot. May 10 00:42:39.411781 systemd[1]: Initializing machine ID from VM UUID. May 10 00:42:39.411793 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:42:39.411803 systemd[1]: Populated /etc with preset unit settings. May 10 00:42:39.411821 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:42:39.411839 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:42:39.411851 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:42:39.411862 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 00:42:39.411873 systemd[1]: Stopped initrd-switch-root.service. May 10 00:42:39.411890 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 00:42:39.411900 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:42:39.411913 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:42:39.411923 systemd[1]: Created slice system-getty.slice. May 10 00:42:39.411933 systemd[1]: Created slice system-modprobe.slice. May 10 00:42:39.411947 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:42:39.411957 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:42:39.411968 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:42:39.411981 systemd[1]: Created slice user.slice. May 10 00:42:39.411998 systemd[1]: Started systemd-ask-password-console.path. May 10 00:42:39.412011 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:42:39.412022 systemd[1]: Set up automount boot.automount. May 10 00:42:39.412032 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:42:39.412056 systemd[1]: Stopped target initrd-switch-root.target. May 10 00:42:39.412068 systemd[1]: Stopped target initrd-fs.target. May 10 00:42:39.412079 systemd[1]: Stopped target initrd-root-fs.target. May 10 00:42:39.412091 systemd[1]: Reached target integritysetup.target. May 10 00:42:39.412114 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:42:39.412202 systemd[1]: Reached target remote-fs.target. May 10 00:42:39.412216 systemd[1]: Reached target slices.target. May 10 00:42:39.412227 systemd[1]: Reached target swap.target. May 10 00:42:39.412481 systemd[1]: Reached target torcx.target. May 10 00:42:39.412496 systemd[1]: Reached target veritysetup.target. May 10 00:42:39.414957 systemd[1]: Listening on systemd-coredump.socket. May 10 00:42:39.414981 systemd[1]: Listening on systemd-initctl.socket. May 10 00:42:39.414994 systemd[1]: Listening on systemd-networkd.socket. May 10 00:42:39.415021 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:42:39.415034 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:42:39.415047 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:42:39.415060 systemd[1]: Mounting dev-hugepages.mount... May 10 00:42:39.415073 systemd[1]: Mounting dev-mqueue.mount... May 10 00:42:39.415086 systemd[1]: Mounting media.mount... May 10 00:42:39.415099 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:42:39.415112 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:42:39.415125 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:42:39.415138 systemd[1]: Mounting tmp.mount... May 10 00:42:39.415161 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:42:39.415175 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:42:39.415188 systemd[1]: Starting kmod-static-nodes.service... May 10 00:42:39.415201 systemd[1]: Starting modprobe@configfs.service... May 10 00:42:39.415214 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:42:39.415227 systemd[1]: Starting modprobe@drm.service... May 10 00:42:39.415241 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:42:39.415254 systemd[1]: Starting modprobe@fuse.service... May 10 00:42:39.415267 systemd[1]: Starting modprobe@loop.service... May 10 00:42:39.415289 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:42:39.415303 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 00:42:39.415316 systemd[1]: Stopped systemd-fsck-root.service. May 10 00:42:39.415329 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 00:42:39.415342 systemd[1]: Stopped systemd-fsck-usr.service. May 10 00:42:39.415354 kernel: fuse: init (API version 7.34) May 10 00:42:39.415367 kernel: loop: module loaded May 10 00:42:39.415380 systemd[1]: Stopped systemd-journald.service. May 10 00:42:39.415403 systemd[1]: Starting systemd-journald.service... May 10 00:42:39.415418 systemd[1]: Starting systemd-modules-load.service... May 10 00:42:39.415432 systemd[1]: Starting systemd-network-generator.service... May 10 00:42:39.415445 systemd[1]: Starting systemd-remount-fs.service... May 10 00:42:39.415458 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:42:39.415472 systemd[1]: verity-setup.service: Deactivated successfully. May 10 00:42:39.415484 systemd[1]: Stopped verity-setup.service. May 10 00:42:39.415498 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:42:39.415515 systemd-journald[992]: Journal started May 10 00:42:39.415591 systemd-journald[992]: Runtime Journal (/run/log/journal/8359fb03c972460f8a040f29912a1941) is 6.0M, max 48.5M, 42.5M free. May 10 00:42:36.514000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:42:36.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:42:36.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:42:36.720000 audit: BPF prog-id=10 op=LOAD May 10 00:42:36.720000 audit: BPF prog-id=10 op=UNLOAD May 10 00:42:36.720000 audit: BPF prog-id=11 op=LOAD May 10 00:42:36.720000 audit: BPF prog-id=11 op=UNLOAD May 10 00:42:36.756000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:42:36.756000 audit[911]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001878d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:36.756000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:42:36.757000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:42:36.757000 audit[911]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000096000 a2=1ed a3=0 items=2 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:36.757000 audit: CWD cwd="/" May 10 00:42:36.757000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:36.757000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:36.757000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:42:39.278000 audit: BPF prog-id=12 op=LOAD May 10 00:42:39.278000 audit: BPF prog-id=3 op=UNLOAD May 10 00:42:39.278000 audit: BPF prog-id=13 op=LOAD May 10 00:42:39.278000 audit: BPF prog-id=14 op=LOAD May 10 00:42:39.278000 audit: BPF prog-id=4 op=UNLOAD May 10 00:42:39.278000 audit: BPF prog-id=5 op=UNLOAD May 10 00:42:39.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.293000 audit: BPF prog-id=12 op=UNLOAD May 10 00:42:39.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.394000 audit: BPF prog-id=15 op=LOAD May 10 00:42:39.394000 audit: BPF prog-id=16 op=LOAD May 10 00:42:39.394000 audit: BPF prog-id=17 op=LOAD May 10 00:42:39.394000 audit: BPF prog-id=13 op=UNLOAD May 10 00:42:39.394000 audit: BPF prog-id=14 op=UNLOAD May 10 00:42:39.409000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:42:39.409000 audit[992]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffff7945980 a2=4000 a3=7ffff7945a1c items=0 ppid=1 pid=992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:39.409000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:42:39.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.276488 systemd[1]: Queued start job for default target multi-user.target. May 10 00:42:36.754795 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:42:39.276499 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 10 00:42:36.755046 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:42:39.279832 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 00:42:36.755063 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:42:36.755094 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:36Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 00:42:36.755105 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:36Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 00:42:36.755136 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:36Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 00:42:36.755149 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:36Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 00:42:36.755360 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:36Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 00:42:36.755395 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:42:36.755407 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:42:36.756097 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 00:42:36.756131 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 00:42:36.756147 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 00:42:36.756161 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 00:42:36.756176 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 00:42:36.756188 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 00:42:39.420558 systemd[1]: Started systemd-journald.service. May 10 00:42:38.966049 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:38Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:42:38.966378 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:38Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:42:38.966492 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:38Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:42:38.966701 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:38Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:42:38.966748 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:38Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 00:42:38.966818 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-10T00:42:38Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 00:42:39.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.422020 systemd[1]: Mounted dev-hugepages.mount. May 10 00:42:39.423057 systemd[1]: Mounted dev-mqueue.mount. May 10 00:42:39.424057 systemd[1]: Mounted media.mount. May 10 00:42:39.424885 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:42:39.425832 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:42:39.426749 systemd[1]: Mounted tmp.mount. May 10 00:42:39.427696 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:42:39.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.428789 systemd[1]: Finished kmod-static-nodes.service. May 10 00:42:39.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.429836 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:42:39.429982 systemd[1]: Finished modprobe@configfs.service. May 10 00:42:39.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.431049 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:42:39.431179 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:42:39.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.432211 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:42:39.432344 systemd[1]: Finished modprobe@drm.service. May 10 00:42:39.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.433338 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:42:39.433459 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:42:39.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.434828 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:42:39.435032 systemd[1]: Finished modprobe@fuse.service. May 10 00:42:39.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.436306 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:42:39.436455 systemd[1]: Finished modprobe@loop.service. May 10 00:42:39.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.437616 systemd[1]: Finished systemd-modules-load.service. May 10 00:42:39.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.439403 systemd[1]: Finished systemd-network-generator.service. May 10 00:42:39.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.440942 systemd[1]: Finished systemd-remount-fs.service. May 10 00:42:39.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.442738 systemd[1]: Reached target network-pre.target. May 10 00:42:39.445317 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:42:39.447654 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:42:39.448529 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:42:39.450416 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:42:39.452777 systemd[1]: Starting systemd-journal-flush.service... May 10 00:42:39.453752 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:42:39.455246 systemd[1]: Starting systemd-random-seed.service... May 10 00:42:39.456289 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:42:39.465864 systemd-journald[992]: Time spent on flushing to /var/log/journal/8359fb03c972460f8a040f29912a1941 is 13.338ms for 1095 entries. May 10 00:42:39.465864 systemd-journald[992]: System Journal (/var/log/journal/8359fb03c972460f8a040f29912a1941) is 8.0M, max 195.6M, 187.6M free. May 10 00:42:39.494419 systemd-journald[992]: Received client request to flush runtime journal. May 10 00:42:39.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.457355 systemd[1]: Starting systemd-sysctl.service... May 10 00:42:39.461978 systemd[1]: Starting systemd-sysusers.service... May 10 00:42:39.464898 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:42:39.465944 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:42:39.479470 systemd[1]: Finished systemd-random-seed.service. May 10 00:42:39.480794 systemd[1]: Finished systemd-sysctl.service. May 10 00:42:39.481790 systemd[1]: Reached target first-boot-complete.target. May 10 00:42:39.484609 systemd[1]: Finished systemd-sysusers.service. May 10 00:42:39.486958 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:42:39.496903 systemd[1]: Finished systemd-journal-flush.service. May 10 00:42:39.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.507769 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:42:39.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.511877 systemd[1]: Starting systemd-udev-settle.service... May 10 00:42:39.513060 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:42:39.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:39.517308 udevadm[1018]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 10 00:42:40.086849 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:42:40.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.088000 audit: BPF prog-id=18 op=LOAD May 10 00:42:40.088000 audit: BPF prog-id=19 op=LOAD May 10 00:42:40.088000 audit: BPF prog-id=7 op=UNLOAD May 10 00:42:40.088000 audit: BPF prog-id=8 op=UNLOAD May 10 00:42:40.089343 systemd[1]: Starting systemd-udevd.service... May 10 00:42:40.105102 systemd-udevd[1019]: Using default interface naming scheme 'v252'. May 10 00:42:40.118071 systemd[1]: Started systemd-udevd.service. May 10 00:42:40.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.120000 audit: BPF prog-id=20 op=LOAD May 10 00:42:40.121899 systemd[1]: Starting systemd-networkd.service... May 10 00:42:40.126000 audit: BPF prog-id=21 op=LOAD May 10 00:42:40.126000 audit: BPF prog-id=22 op=LOAD May 10 00:42:40.126000 audit: BPF prog-id=23 op=LOAD May 10 00:42:40.127691 systemd[1]: Starting systemd-userdbd.service... May 10 00:42:40.146012 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 00:42:40.156144 systemd[1]: Started systemd-userdbd.service. May 10 00:42:40.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.189648 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 10 00:42:40.196022 kernel: ACPI: button: Power Button [PWRF] May 10 00:42:40.194535 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:42:40.215582 systemd-networkd[1030]: lo: Link UP May 10 00:42:40.216015 systemd-networkd[1030]: lo: Gained carrier May 10 00:42:40.216618 systemd-networkd[1030]: Enumeration completed May 10 00:42:40.216799 systemd[1]: Started systemd-networkd.service. May 10 00:42:40.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.211000 audit[1021]: AVC avc: denied { confidentiality } for pid=1021 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:42:40.219053 systemd-networkd[1030]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:42:40.211000 audit[1021]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555d8b0187b0 a1=338ac a2=7fcf7a28dbc5 a3=5 items=110 ppid=1019 pid=1021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:40.211000 audit: CWD cwd="/" May 10 00:42:40.211000 audit: PATH item=0 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=1 name=(null) inode=9829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=2 name=(null) inode=9829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=3 name=(null) inode=9830 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=4 name=(null) inode=9829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=5 name=(null) inode=9831 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=6 name=(null) inode=9829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=7 name=(null) inode=9832 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=8 name=(null) inode=9832 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=9 name=(null) inode=9833 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=10 name=(null) inode=9832 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=11 name=(null) inode=9834 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=12 name=(null) inode=9832 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=13 name=(null) inode=9835 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=14 name=(null) inode=9832 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=15 name=(null) inode=9836 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=16 name=(null) inode=9832 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=17 name=(null) inode=9837 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=18 name=(null) inode=9829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=19 name=(null) inode=9838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=20 name=(null) inode=9838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=21 name=(null) inode=9839 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=22 name=(null) inode=9838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=23 name=(null) inode=9840 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=24 name=(null) inode=9838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=25 name=(null) inode=9841 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=26 name=(null) inode=9838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=27 name=(null) inode=9842 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=28 name=(null) inode=9838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=29 name=(null) inode=9843 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=30 name=(null) inode=9829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=31 name=(null) inode=9844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=32 name=(null) inode=9844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=33 name=(null) inode=9845 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=34 name=(null) inode=9844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=35 name=(null) inode=9846 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=36 name=(null) inode=9844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=37 name=(null) inode=9847 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=38 name=(null) inode=9844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=39 name=(null) inode=9848 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=40 name=(null) inode=9844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=41 name=(null) inode=9849 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=42 name=(null) inode=9829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=43 name=(null) inode=9850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=44 name=(null) inode=9850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=45 name=(null) inode=9851 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=46 name=(null) inode=9850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=47 name=(null) inode=9852 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=48 name=(null) inode=9850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=49 name=(null) inode=9853 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=50 name=(null) inode=9850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=51 name=(null) inode=9854 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=52 name=(null) inode=9850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=53 name=(null) inode=9855 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=54 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=55 name=(null) inode=9856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=56 name=(null) inode=9856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=57 name=(null) inode=9857 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=58 name=(null) inode=9856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=59 name=(null) inode=9858 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=60 name=(null) inode=9856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=61 name=(null) inode=9859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=62 name=(null) inode=9859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=63 name=(null) inode=9860 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=64 name=(null) inode=9859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=65 name=(null) inode=9861 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=66 name=(null) inode=9859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=67 name=(null) inode=9862 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=68 name=(null) inode=9859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=69 name=(null) inode=9863 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=70 name=(null) inode=9859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=71 name=(null) inode=9864 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=72 name=(null) inode=9856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=73 name=(null) inode=9865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=74 name=(null) inode=9865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=75 name=(null) inode=9866 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=76 name=(null) inode=9865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=77 name=(null) inode=9867 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=78 name=(null) inode=9865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=79 name=(null) inode=9868 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=80 name=(null) inode=9865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=81 name=(null) inode=9869 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=82 name=(null) inode=9865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=83 name=(null) inode=9870 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=84 name=(null) inode=9856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=85 name=(null) inode=9871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=86 name=(null) inode=9871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=87 name=(null) inode=9872 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=88 name=(null) inode=9871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=89 name=(null) inode=9873 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=90 name=(null) inode=9871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=91 name=(null) inode=9874 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=92 name=(null) inode=9871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=93 name=(null) inode=9875 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=94 name=(null) inode=9871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=95 name=(null) inode=9876 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=96 name=(null) inode=9856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=97 name=(null) inode=9877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=98 name=(null) inode=9877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=99 name=(null) inode=9878 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=100 name=(null) inode=9877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=101 name=(null) inode=9879 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=102 name=(null) inode=9877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=103 name=(null) inode=9880 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=104 name=(null) inode=9877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=105 name=(null) inode=9881 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=106 name=(null) inode=9877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=107 name=(null) inode=9882 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PATH item=109 name=(null) inode=9883 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:42:40.211000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:42:40.223455 systemd-networkd[1030]: eth0: Link UP May 10 00:42:40.223459 systemd-networkd[1030]: eth0: Gained carrier May 10 00:42:40.228574 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 10 00:42:40.235919 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 10 00:42:40.235944 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 10 00:42:40.236093 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 10 00:42:40.238697 systemd-networkd[1030]: eth0: DHCPv4 address 10.0.0.88/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 10 00:42:40.270570 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:42:40.315578 kernel: kvm: Nested Virtualization enabled May 10 00:42:40.315735 kernel: SVM: kvm: Nested Paging enabled May 10 00:42:40.315762 kernel: SVM: Virtual VMLOAD VMSAVE supported May 10 00:42:40.315786 kernel: SVM: Virtual GIF supported May 10 00:42:40.332566 kernel: EDAC MC: Ver: 3.0.0 May 10 00:42:40.355980 systemd[1]: Finished systemd-udev-settle.service. May 10 00:42:40.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.357916 systemd[1]: Starting lvm2-activation-early.service... May 10 00:42:40.365650 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:42:40.425815 systemd[1]: Finished lvm2-activation-early.service. May 10 00:42:40.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.426977 systemd[1]: Reached target cryptsetup.target. May 10 00:42:40.428893 systemd[1]: Starting lvm2-activation.service... May 10 00:42:40.432461 lvm[1056]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:42:40.457909 systemd[1]: Finished lvm2-activation.service. May 10 00:42:40.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.458885 systemd[1]: Reached target local-fs-pre.target. May 10 00:42:40.459738 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:42:40.459756 systemd[1]: Reached target local-fs.target. May 10 00:42:40.460563 systemd[1]: Reached target machines.target. May 10 00:42:40.462397 systemd[1]: Starting ldconfig.service... May 10 00:42:40.463680 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:42:40.463743 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:42:40.465357 systemd[1]: Starting systemd-boot-update.service... May 10 00:42:40.467517 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:42:40.469569 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:42:40.471630 systemd[1]: Starting systemd-sysext.service... May 10 00:42:40.472738 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1058 (bootctl) May 10 00:42:40.473646 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:42:40.482045 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:42:40.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.485756 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:42:40.491775 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:42:40.491989 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:42:40.502575 kernel: loop0: detected capacity change from 0 to 218376 May 10 00:42:40.509126 systemd-fsck[1065]: fsck.fat 4.2 (2021-01-31) May 10 00:42:40.509126 systemd-fsck[1065]: /dev/vda1: 790 files, 120688/258078 clusters May 10 00:42:40.511285 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:42:40.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.514085 systemd[1]: Mounting boot.mount... May 10 00:42:40.704979 systemd[1]: Mounted boot.mount. May 10 00:42:40.708704 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:42:40.709308 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:42:40.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.740617 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:42:40.754585 kernel: loop1: detected capacity change from 0 to 218376 May 10 00:42:40.765452 systemd[1]: Finished systemd-boot-update.service. May 10 00:42:40.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.767915 (sd-sysext)[1071]: Using extensions 'kubernetes'. May 10 00:42:40.768385 (sd-sysext)[1071]: Merged extensions into '/usr'. May 10 00:42:40.785134 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:42:40.786979 systemd[1]: Mounting usr-share-oem.mount... May 10 00:42:40.788202 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:42:40.789681 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:42:40.791856 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:42:40.794271 systemd[1]: Starting modprobe@loop.service... May 10 00:42:40.795319 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:42:40.795431 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:42:40.795550 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:42:40.798163 systemd[1]: Mounted usr-share-oem.mount. May 10 00:42:40.799360 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:42:40.799495 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:42:40.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.800877 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:42:40.800987 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:42:40.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.802295 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:42:40.802398 systemd[1]: Finished modprobe@loop.service. May 10 00:42:40.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.803870 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:42:40.803960 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:42:40.804904 systemd[1]: Finished systemd-sysext.service. May 10 00:42:40.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:40.822018 systemd[1]: Starting ensure-sysext.service... May 10 00:42:40.824383 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:42:40.827441 systemd[1]: Reloading. May 10 00:42:40.834572 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:42:40.835684 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:42:40.837627 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:42:40.900029 ldconfig[1057]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:42:40.915785 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2025-05-10T00:42:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:42:40.916099 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2025-05-10T00:42:40Z" level=info msg="torcx already run" May 10 00:42:41.004490 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:42:41.004518 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:42:41.031930 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:42:41.086000 audit: BPF prog-id=24 op=LOAD May 10 00:42:41.086000 audit: BPF prog-id=15 op=UNLOAD May 10 00:42:41.086000 audit: BPF prog-id=25 op=LOAD May 10 00:42:41.086000 audit: BPF prog-id=26 op=LOAD May 10 00:42:41.086000 audit: BPF prog-id=16 op=UNLOAD May 10 00:42:41.086000 audit: BPF prog-id=17 op=UNLOAD May 10 00:42:41.088000 audit: BPF prog-id=27 op=LOAD May 10 00:42:41.088000 audit: BPF prog-id=21 op=UNLOAD May 10 00:42:41.088000 audit: BPF prog-id=28 op=LOAD May 10 00:42:41.088000 audit: BPF prog-id=29 op=LOAD May 10 00:42:41.088000 audit: BPF prog-id=22 op=UNLOAD May 10 00:42:41.088000 audit: BPF prog-id=23 op=UNLOAD May 10 00:42:41.089000 audit: BPF prog-id=30 op=LOAD May 10 00:42:41.089000 audit: BPF prog-id=20 op=UNLOAD May 10 00:42:41.090000 audit: BPF prog-id=31 op=LOAD May 10 00:42:41.090000 audit: BPF prog-id=32 op=LOAD May 10 00:42:41.090000 audit: BPF prog-id=18 op=UNLOAD May 10 00:42:41.090000 audit: BPF prog-id=19 op=UNLOAD May 10 00:42:41.093117 systemd[1]: Finished ldconfig.service. May 10 00:42:41.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:41.095249 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:42:41.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:41.099370 systemd[1]: Starting audit-rules.service... May 10 00:42:41.101297 systemd[1]: Starting clean-ca-certificates.service... May 10 00:42:41.103455 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:42:41.104000 audit: BPF prog-id=33 op=LOAD May 10 00:42:41.106104 systemd[1]: Starting systemd-resolved.service... May 10 00:42:41.107000 audit: BPF prog-id=34 op=LOAD May 10 00:42:41.108595 systemd[1]: Starting systemd-timesyncd.service... May 10 00:42:41.110480 systemd[1]: Starting systemd-update-utmp.service... May 10 00:42:41.112283 systemd[1]: Finished clean-ca-certificates.service. May 10 00:42:41.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:41.115000 audit[1151]: SYSTEM_BOOT pid=1151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:42:41.118726 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:42:41.121847 systemd[1]: Finished systemd-update-utmp.service. May 10 00:42:41.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:41.123502 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:42:41.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:41.125637 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:42:41.127164 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:42:41.129327 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:42:41.131606 systemd[1]: Starting modprobe@loop.service... May 10 00:42:41.132479 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:42:41.132725 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:42:41.134334 systemd[1]: Starting systemd-update-done.service... May 10 00:42:41.135297 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:42:41.136460 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:42:41.136611 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:42:41.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:41.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:41.138289 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:42:41.138522 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:42:41.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:41.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:41.139950 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:42:41.140229 systemd[1]: Finished modprobe@loop.service. May 10 00:42:41.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:41.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:41.141764 systemd[1]: Finished systemd-update-done.service. May 10 00:42:41.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:41.144413 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:42:41.146257 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:42:41.148502 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:42:41.150801 systemd[1]: Starting modprobe@loop.service... May 10 00:42:41.151713 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:42:41.151814 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:42:41.151897 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:42:41.152641 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:42:41.152765 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:42:41.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:41.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:41.155059 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:42:41.155166 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:42:41.158002 augenrules[1167]: No rules May 10 00:42:41.158147 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:42:41.158296 systemd[1]: Finished modprobe@loop.service. May 10 00:42:41.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:41.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:41.157000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:42:41.157000 audit[1167]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd33e2d560 a2=420 a3=0 items=0 ppid=1140 pid=1167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:41.157000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:42:41.159706 systemd[1]: Finished audit-rules.service. May 10 00:42:41.161023 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:42:41.161164 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:42:41.165040 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:42:41.166876 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:42:41.169024 systemd[1]: Starting modprobe@drm.service... May 10 00:42:41.171554 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:42:41.173505 systemd[1]: Starting modprobe@loop.service... May 10 00:42:41.174459 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:42:41.174734 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:42:41.174965 systemd-resolved[1146]: Positive Trust Anchors: May 10 00:42:41.175220 systemd-resolved[1146]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:42:41.175320 systemd-resolved[1146]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:42:41.845214 systemd-timesyncd[1147]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 10 00:42:41.845261 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:42:41.845861 systemd-timesyncd[1147]: Initial clock synchronization to Sat 2025-05-10 00:42:41.845138 UTC. May 10 00:42:41.846400 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:42:41.847599 systemd[1]: Started systemd-timesyncd.service. May 10 00:42:41.849375 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:42:41.849535 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:42:41.850903 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:42:41.851035 systemd[1]: Finished modprobe@drm.service. May 10 00:42:41.852256 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:42:41.852385 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:42:41.853782 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:42:41.853950 systemd[1]: Finished modprobe@loop.service. May 10 00:42:41.855528 systemd[1]: Reached target time-set.target. May 10 00:42:41.856450 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:42:41.856567 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:42:41.862775 systemd[1]: Finished ensure-sysext.service. May 10 00:42:41.869279 systemd-resolved[1146]: Defaulting to hostname 'linux'. May 10 00:42:41.871226 systemd[1]: Started systemd-resolved.service. May 10 00:42:41.872187 systemd[1]: Reached target network.target. May 10 00:42:41.873030 systemd[1]: Reached target nss-lookup.target. May 10 00:42:41.873903 systemd[1]: Reached target sysinit.target. May 10 00:42:41.874814 systemd[1]: Started motdgen.path. May 10 00:42:41.875594 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:42:41.877022 systemd[1]: Started logrotate.timer. May 10 00:42:41.878116 systemd[1]: Started mdadm.timer. May 10 00:42:41.878954 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:42:41.880151 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:42:41.880178 systemd[1]: Reached target paths.target. May 10 00:42:41.881050 systemd[1]: Reached target timers.target. May 10 00:42:41.882219 systemd[1]: Listening on dbus.socket. May 10 00:42:41.884088 systemd[1]: Starting docker.socket... May 10 00:42:41.887265 systemd[1]: Listening on sshd.socket. May 10 00:42:41.888179 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:42:41.888520 systemd[1]: Listening on docker.socket. May 10 00:42:41.889366 systemd[1]: Reached target sockets.target. May 10 00:42:41.890170 systemd[1]: Reached target basic.target. May 10 00:42:41.890958 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:42:41.890978 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:42:41.891862 systemd[1]: Starting containerd.service... May 10 00:42:41.893436 systemd[1]: Starting dbus.service... May 10 00:42:41.895042 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:42:41.896770 systemd[1]: Starting extend-filesystems.service... May 10 00:42:41.900597 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:42:41.902350 jq[1182]: false May 10 00:42:41.901698 systemd[1]: Starting motdgen.service... May 10 00:42:41.903472 systemd[1]: Starting prepare-helm.service... May 10 00:42:41.905397 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:42:41.907264 systemd[1]: Starting sshd-keygen.service... May 10 00:42:41.908803 extend-filesystems[1183]: Found loop1 May 10 00:42:41.909788 extend-filesystems[1183]: Found sr0 May 10 00:42:41.909788 extend-filesystems[1183]: Found vda May 10 00:42:41.909788 extend-filesystems[1183]: Found vda1 May 10 00:42:41.909788 extend-filesystems[1183]: Found vda2 May 10 00:42:41.909788 extend-filesystems[1183]: Found vda3 May 10 00:42:41.909788 extend-filesystems[1183]: Found usr May 10 00:42:41.965722 extend-filesystems[1183]: Found vda4 May 10 00:42:41.965722 extend-filesystems[1183]: Found vda6 May 10 00:42:41.965722 extend-filesystems[1183]: Found vda7 May 10 00:42:41.965722 extend-filesystems[1183]: Found vda9 May 10 00:42:41.965722 extend-filesystems[1183]: Checking size of /dev/vda9 May 10 00:42:41.911394 systemd[1]: Starting systemd-logind.service... May 10 00:42:41.986573 extend-filesystems[1183]: Resized partition /dev/vda9 May 10 00:42:41.915552 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:42:41.991939 extend-filesystems[1232]: resize2fs 1.46.5 (30-Dec-2021) May 10 00:42:42.028190 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 10 00:42:41.915631 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 00:42:42.029385 jq[1199]: true May 10 00:42:42.023198 dbus-daemon[1181]: [system] SELinux support is enabled May 10 00:42:41.916068 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 00:42:42.026675 dbus-daemon[1181]: [system] Successfully activated service 'org.freedesktop.systemd1' May 10 00:42:41.916927 systemd[1]: Starting update-engine.service... May 10 00:42:42.029992 tar[1201]: linux-amd64/LICENSE May 10 00:42:42.029992 tar[1201]: linux-amd64/helm May 10 00:42:41.919603 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:42:41.921179 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:42:42.030406 jq[1204]: true May 10 00:42:41.921405 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:42:41.922638 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:42:41.922844 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:42:41.970270 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:42:41.970485 systemd[1]: Finished motdgen.service. May 10 00:42:42.073694 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 10 00:42:42.073780 bash[1230]: Updated "/home/core/.ssh/authorized_keys" May 10 00:42:42.073892 update_engine[1196]: I0510 00:42:42.050280 1196 main.cc:92] Flatcar Update Engine starting May 10 00:42:42.073892 update_engine[1196]: I0510 00:42:42.056133 1196 update_check_scheduler.cc:74] Next update check in 8m48s May 10 00:42:41.995878 systemd-logind[1191]: Watching system buttons on /dev/input/event1 (Power Button) May 10 00:42:41.995894 systemd-logind[1191]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:42:42.075568 extend-filesystems[1232]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 10 00:42:42.075568 extend-filesystems[1232]: old_desc_blocks = 1, new_desc_blocks = 1 May 10 00:42:42.075568 extend-filesystems[1232]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 10 00:42:41.996122 systemd-logind[1191]: New seat seat0. May 10 00:42:42.081154 env[1202]: time="2025-05-10T00:42:42.075869199Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:42:42.081350 extend-filesystems[1183]: Resized filesystem in /dev/vda9 May 10 00:42:42.023397 systemd[1]: Started dbus.service. May 10 00:42:42.026098 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:42:42.026117 systemd[1]: Reached target system-config.target. May 10 00:42:42.027226 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:42:42.027240 systemd[1]: Reached target user-config.target. May 10 00:42:42.028211 systemd[1]: Started systemd-logind.service. May 10 00:42:42.048171 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:42:42.054441 systemd[1]: Started update-engine.service. May 10 00:42:42.057870 systemd[1]: Started locksmithd.service. May 10 00:42:42.075131 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:42:42.075310 systemd[1]: Finished extend-filesystems.service. May 10 00:42:42.121007 env[1202]: time="2025-05-10T00:42:42.120938165Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:42:42.121160 env[1202]: time="2025-05-10T00:42:42.121106521Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:42:42.125973 locksmithd[1235]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:42:42.128871 env[1202]: time="2025-05-10T00:42:42.127838078Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:42:42.128871 env[1202]: time="2025-05-10T00:42:42.127875528Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:42:42.128871 env[1202]: time="2025-05-10T00:42:42.128122672Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:42:42.128871 env[1202]: time="2025-05-10T00:42:42.128138772Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:42:42.128871 env[1202]: time="2025-05-10T00:42:42.128152377Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:42:42.128871 env[1202]: time="2025-05-10T00:42:42.128161024Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:42:42.128871 env[1202]: time="2025-05-10T00:42:42.128240442Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:42:42.128871 env[1202]: time="2025-05-10T00:42:42.128479952Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:42:42.128871 env[1202]: time="2025-05-10T00:42:42.128612470Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:42:42.128871 env[1202]: time="2025-05-10T00:42:42.128649149Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:42:42.129110 env[1202]: time="2025-05-10T00:42:42.128701577Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:42:42.129110 env[1202]: time="2025-05-10T00:42:42.128713249Z" level=info msg="metadata content store policy set" policy=shared May 10 00:42:42.134591 env[1202]: time="2025-05-10T00:42:42.134461401Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:42:42.134591 env[1202]: time="2025-05-10T00:42:42.134488692Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:42:42.134591 env[1202]: time="2025-05-10T00:42:42.134501767Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:42:42.134591 env[1202]: time="2025-05-10T00:42:42.134536091Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:42:42.134591 env[1202]: time="2025-05-10T00:42:42.134567460Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:42:42.134591 env[1202]: time="2025-05-10T00:42:42.134589501Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:42:42.134591 env[1202]: time="2025-05-10T00:42:42.134601244Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:42:42.134846 env[1202]: time="2025-05-10T00:42:42.134614699Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:42:42.134846 env[1202]: time="2025-05-10T00:42:42.134629497Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:42:42.134846 env[1202]: time="2025-05-10T00:42:42.134642260Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:42:42.134846 env[1202]: time="2025-05-10T00:42:42.134653141Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:42:42.134846 env[1202]: time="2025-05-10T00:42:42.134667778Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:42:42.134846 env[1202]: time="2025-05-10T00:42:42.134764770Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:42:42.134961 env[1202]: time="2025-05-10T00:42:42.134862003Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:42:42.135115 env[1202]: time="2025-05-10T00:42:42.135087836Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:42:42.135115 env[1202]: time="2025-05-10T00:42:42.135114737Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:42:42.135186 env[1202]: time="2025-05-10T00:42:42.135127120Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:42:42.135213 env[1202]: time="2025-05-10T00:42:42.135193434Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:42:42.135213 env[1202]: time="2025-05-10T00:42:42.135207040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:42:42.135253 env[1202]: time="2025-05-10T00:42:42.135218221Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:42:42.135253 env[1202]: time="2025-05-10T00:42:42.135228801Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:42:42.135253 env[1202]: time="2025-05-10T00:42:42.135239841Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:42:42.135253 env[1202]: time="2025-05-10T00:42:42.135251072Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:42:42.135329 env[1202]: time="2025-05-10T00:42:42.135261692Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:42:42.135329 env[1202]: time="2025-05-10T00:42:42.135273645Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:42:42.135329 env[1202]: time="2025-05-10T00:42:42.135285487Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:42:42.135429 env[1202]: time="2025-05-10T00:42:42.135408888Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:42:42.135429 env[1202]: time="2025-05-10T00:42:42.135428355Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:42:42.135513 env[1202]: time="2025-05-10T00:42:42.135440628Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:42:42.135513 env[1202]: time="2025-05-10T00:42:42.135450747Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:42:42.135513 env[1202]: time="2025-05-10T00:42:42.135468691Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:42:42.135513 env[1202]: time="2025-05-10T00:42:42.135478018Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:42:42.135513 env[1202]: time="2025-05-10T00:42:42.135495551Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:42:42.135647 env[1202]: time="2025-05-10T00:42:42.135527591Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:42:42.135798 env[1202]: time="2025-05-10T00:42:42.135734950Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:42:42.135798 env[1202]: time="2025-05-10T00:42:42.135791666Z" level=info msg="Connect containerd service" May 10 00:42:42.136559 env[1202]: time="2025-05-10T00:42:42.135823456Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:42:42.136559 env[1202]: time="2025-05-10T00:42:42.136460250Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:42:42.137327 env[1202]: time="2025-05-10T00:42:42.136702194Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:42:42.137327 env[1202]: time="2025-05-10T00:42:42.136748150Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:42:42.137327 env[1202]: time="2025-05-10T00:42:42.136731259Z" level=info msg="Start subscribing containerd event" May 10 00:42:42.137327 env[1202]: time="2025-05-10T00:42:42.136789718Z" level=info msg="Start recovering state" May 10 00:42:42.137327 env[1202]: time="2025-05-10T00:42:42.136852586Z" level=info msg="Start event monitor" May 10 00:42:42.137327 env[1202]: time="2025-05-10T00:42:42.136867595Z" level=info msg="Start snapshots syncer" May 10 00:42:42.137327 env[1202]: time="2025-05-10T00:42:42.136876852Z" level=info msg="Start cni network conf syncer for default" May 10 00:42:42.137327 env[1202]: time="2025-05-10T00:42:42.136884206Z" level=info msg="Start streaming server" May 10 00:42:42.136858 systemd[1]: Started containerd.service. May 10 00:42:42.138640 env[1202]: time="2025-05-10T00:42:42.138620052Z" level=info msg="containerd successfully booted in 0.103738s" May 10 00:42:42.161156 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:42:42.161240 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:42:42.618876 systemd-networkd[1030]: eth0: Gained IPv6LL May 10 00:42:42.620969 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:42:42.622618 systemd[1]: Reached target network-online.target. May 10 00:42:42.625314 systemd[1]: Starting kubelet.service... May 10 00:42:42.637029 tar[1201]: linux-amd64/README.md May 10 00:42:42.641503 systemd[1]: Finished prepare-helm.service. May 10 00:42:43.294316 sshd_keygen[1197]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:42:43.316285 systemd[1]: Finished sshd-keygen.service. May 10 00:42:43.350222 systemd[1]: Starting issuegen.service... May 10 00:42:43.356211 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:42:43.356385 systemd[1]: Finished issuegen.service. May 10 00:42:43.358863 systemd[1]: Starting systemd-user-sessions.service... May 10 00:42:43.364706 systemd[1]: Finished systemd-user-sessions.service. May 10 00:42:43.367398 systemd[1]: Started getty@tty1.service. May 10 00:42:43.369710 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:42:43.370974 systemd[1]: Reached target getty.target. May 10 00:42:43.911729 systemd[1]: Started kubelet.service. May 10 00:42:43.913334 systemd[1]: Reached target multi-user.target. May 10 00:42:43.916115 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:42:43.923180 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:42:43.923388 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:42:43.924599 systemd[1]: Startup finished in 705ms (kernel) + 4.710s (initrd) + 6.780s (userspace) = 12.197s. May 10 00:42:44.690886 kubelet[1262]: E0510 00:42:44.690823 1262 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:42:44.692575 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:42:44.692688 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:42:44.692884 systemd[1]: kubelet.service: Consumed 1.990s CPU time. May 10 00:42:45.489113 systemd[1]: Created slice system-sshd.slice. May 10 00:42:45.490515 systemd[1]: Started sshd@0-10.0.0.88:22-10.0.0.1:59964.service. May 10 00:42:45.532835 sshd[1271]: Accepted publickey for core from 10.0.0.1 port 59964 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:42:45.534486 sshd[1271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:42:45.544135 systemd-logind[1191]: New session 1 of user core. May 10 00:42:45.545037 systemd[1]: Created slice user-500.slice. May 10 00:42:45.546132 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:42:45.554126 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:42:45.555492 systemd[1]: Starting user@500.service... May 10 00:42:45.558625 (systemd)[1274]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:42:45.637166 systemd[1274]: Queued start job for default target default.target. May 10 00:42:45.637864 systemd[1274]: Reached target paths.target. May 10 00:42:45.637894 systemd[1274]: Reached target sockets.target. May 10 00:42:45.637910 systemd[1274]: Reached target timers.target. May 10 00:42:45.637924 systemd[1274]: Reached target basic.target. May 10 00:42:45.638050 systemd[1]: Started user@500.service. May 10 00:42:45.638604 systemd[1274]: Reached target default.target. May 10 00:42:45.638662 systemd[1274]: Startup finished in 73ms. May 10 00:42:45.639251 systemd[1]: Started session-1.scope. May 10 00:42:45.690703 systemd[1]: Started sshd@1-10.0.0.88:22-10.0.0.1:59980.service. May 10 00:42:45.728227 sshd[1283]: Accepted publickey for core from 10.0.0.1 port 59980 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:42:45.729461 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:42:45.733251 systemd-logind[1191]: New session 2 of user core. May 10 00:42:45.734386 systemd[1]: Started session-2.scope. May 10 00:42:45.791633 sshd[1283]: pam_unix(sshd:session): session closed for user core May 10 00:42:45.795234 systemd[1]: sshd@1-10.0.0.88:22-10.0.0.1:59980.service: Deactivated successfully. May 10 00:42:45.795983 systemd[1]: session-2.scope: Deactivated successfully. May 10 00:42:45.796642 systemd-logind[1191]: Session 2 logged out. Waiting for processes to exit. May 10 00:42:45.798139 systemd[1]: Started sshd@2-10.0.0.88:22-10.0.0.1:59988.service. May 10 00:42:45.798952 systemd-logind[1191]: Removed session 2. May 10 00:42:45.836593 sshd[1289]: Accepted publickey for core from 10.0.0.1 port 59988 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:42:45.837935 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:42:45.841528 systemd-logind[1191]: New session 3 of user core. May 10 00:42:45.842359 systemd[1]: Started session-3.scope. May 10 00:42:45.891480 sshd[1289]: pam_unix(sshd:session): session closed for user core May 10 00:42:45.894996 systemd[1]: sshd@2-10.0.0.88:22-10.0.0.1:59988.service: Deactivated successfully. May 10 00:42:45.895531 systemd[1]: session-3.scope: Deactivated successfully. May 10 00:42:45.896032 systemd-logind[1191]: Session 3 logged out. Waiting for processes to exit. May 10 00:42:45.896969 systemd[1]: Started sshd@3-10.0.0.88:22-10.0.0.1:59998.service. May 10 00:42:45.897760 systemd-logind[1191]: Removed session 3. May 10 00:42:45.936405 sshd[1295]: Accepted publickey for core from 10.0.0.1 port 59998 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:42:45.938034 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:42:45.941729 systemd-logind[1191]: New session 4 of user core. May 10 00:42:45.942401 systemd[1]: Started session-4.scope. May 10 00:42:45.996764 sshd[1295]: pam_unix(sshd:session): session closed for user core May 10 00:42:45.999720 systemd[1]: sshd@3-10.0.0.88:22-10.0.0.1:59998.service: Deactivated successfully. May 10 00:42:46.000219 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:42:46.000856 systemd-logind[1191]: Session 4 logged out. Waiting for processes to exit. May 10 00:42:46.001759 systemd[1]: Started sshd@4-10.0.0.88:22-10.0.0.1:60012.service. May 10 00:42:46.002386 systemd-logind[1191]: Removed session 4. May 10 00:42:46.037826 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 60012 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:42:46.039866 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:42:46.044003 systemd-logind[1191]: New session 5 of user core. May 10 00:42:46.045133 systemd[1]: Started session-5.scope. May 10 00:42:46.101107 sudo[1304]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:42:46.101381 sudo[1304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:42:46.109905 dbus-daemon[1181]: \xd0\u000d\x9c\u007f^U: received setenforce notice (enforcing=-438589760) May 10 00:42:46.112225 sudo[1304]: pam_unix(sudo:session): session closed for user root May 10 00:42:46.114754 sshd[1301]: pam_unix(sshd:session): session closed for user core May 10 00:42:46.118288 systemd[1]: sshd@4-10.0.0.88:22-10.0.0.1:60012.service: Deactivated successfully. May 10 00:42:46.118965 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:42:46.119754 systemd-logind[1191]: Session 5 logged out. Waiting for processes to exit. May 10 00:42:46.120847 systemd[1]: Started sshd@5-10.0.0.88:22-10.0.0.1:60022.service. May 10 00:42:46.121809 systemd-logind[1191]: Removed session 5. May 10 00:42:46.163813 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 60022 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:42:46.165451 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:42:46.170458 systemd-logind[1191]: New session 6 of user core. May 10 00:42:46.171605 systemd[1]: Started session-6.scope. May 10 00:42:46.226530 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:42:46.226755 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:42:46.229532 sudo[1312]: pam_unix(sudo:session): session closed for user root May 10 00:42:46.234160 sudo[1311]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:42:46.234400 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:42:46.244724 systemd[1]: Stopping audit-rules.service... May 10 00:42:46.245000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:42:46.246360 auditctl[1315]: No rules May 10 00:42:46.247363 kernel: kauditd_printk_skb: 267 callbacks suppressed May 10 00:42:46.247403 kernel: audit: type=1305 audit(1746837766.245:197): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:42:46.247689 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:42:46.247870 systemd[1]: Stopped audit-rules.service. May 10 00:42:46.249509 systemd[1]: Starting audit-rules.service... May 10 00:42:46.245000 audit[1315]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd53882ff0 a2=420 a3=0 items=0 ppid=1 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:46.254559 kernel: audit: type=1300 audit(1746837766.245:197): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd53882ff0 a2=420 a3=0 items=0 ppid=1 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:46.245000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:42:46.256103 kernel: audit: type=1327 audit(1746837766.245:197): proctitle=2F7362696E2F617564697463746C002D44 May 10 00:42:46.256150 kernel: audit: type=1131 audit(1746837766.247:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:46.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:46.270722 augenrules[1332]: No rules May 10 00:42:46.271426 systemd[1]: Finished audit-rules.service. May 10 00:42:46.283590 kernel: audit: type=1130 audit(1746837766.271:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:46.283699 kernel: audit: type=1106 audit(1746837766.271:200): pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:42:46.283746 kernel: audit: type=1104 audit(1746837766.271:201): pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:42:46.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:46.271000 audit[1311]: USER_END pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:42:46.271000 audit[1311]: CRED_DISP pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:42:46.275798 systemd[1]: sshd@5-10.0.0.88:22-10.0.0.1:60022.service: Deactivated successfully. May 10 00:42:46.272270 sudo[1311]: pam_unix(sudo:session): session closed for user root May 10 00:42:46.276798 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:42:46.273502 sshd[1308]: pam_unix(sshd:session): session closed for user core May 10 00:42:46.277330 systemd-logind[1191]: Session 6 logged out. Waiting for processes to exit. May 10 00:42:46.278174 systemd[1]: Started sshd@6-10.0.0.88:22-10.0.0.1:60032.service. May 10 00:42:46.278942 systemd-logind[1191]: Removed session 6. May 10 00:42:46.273000 audit[1308]: USER_END pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:42:46.289700 kernel: audit: type=1106 audit(1746837766.273:202): pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:42:46.289748 kernel: audit: type=1104 audit(1746837766.273:203): pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:42:46.273000 audit[1308]: CRED_DISP pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:42:46.294077 kernel: audit: type=1131 audit(1746837766.275:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.88:22-10.0.0.1:60022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:46.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.88:22-10.0.0.1:60022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:46.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.88:22-10.0.0.1:60032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:46.318000 audit[1338]: USER_ACCT pid=1338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:42:46.319342 sshd[1338]: Accepted publickey for core from 10.0.0.1 port 60032 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:42:46.319000 audit[1338]: CRED_ACQ pid=1338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:42:46.319000 audit[1338]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5e3aa430 a2=3 a3=0 items=0 ppid=1 pid=1338 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:46.319000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:42:46.320351 sshd[1338]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:42:46.323630 systemd-logind[1191]: New session 7 of user core. May 10 00:42:46.324354 systemd[1]: Started session-7.scope. May 10 00:42:46.327000 audit[1338]: USER_START pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:42:46.328000 audit[1340]: CRED_ACQ pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:42:46.376000 audit[1341]: USER_ACCT pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:42:46.376000 audit[1341]: CRED_REFR pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:42:46.377123 sudo[1341]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 00:42:46.377385 sudo[1341]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:42:46.379000 audit[1341]: USER_START pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:42:46.426528 systemd[1]: Starting docker.service... May 10 00:42:46.480694 env[1353]: time="2025-05-10T00:42:46.480625863Z" level=info msg="Starting up" May 10 00:42:46.482902 env[1353]: time="2025-05-10T00:42:46.482688603Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:42:46.482902 env[1353]: time="2025-05-10T00:42:46.482898927Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:42:46.483027 env[1353]: time="2025-05-10T00:42:46.482940385Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:42:46.483027 env[1353]: time="2025-05-10T00:42:46.482960553Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:42:46.485060 env[1353]: time="2025-05-10T00:42:46.485036076Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:42:46.485156 env[1353]: time="2025-05-10T00:42:46.485137236Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:42:46.485329 env[1353]: time="2025-05-10T00:42:46.485277449Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:42:46.485481 env[1353]: time="2025-05-10T00:42:46.485429083Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:42:46.491462 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1245762201-merged.mount: Deactivated successfully. May 10 00:42:47.478466 env[1353]: time="2025-05-10T00:42:47.478373783Z" level=info msg="Loading containers: start." May 10 00:42:47.538000 audit[1389]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.538000 audit[1389]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe73083610 a2=0 a3=7ffe730835fc items=0 ppid=1353 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.538000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 10 00:42:47.540000 audit[1391]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.540000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffec0e0da30 a2=0 a3=7ffec0e0da1c items=0 ppid=1353 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.540000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 10 00:42:47.542000 audit[1393]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.542000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffc9ec47c0 a2=0 a3=7fffc9ec47ac items=0 ppid=1353 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.542000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:42:47.544000 audit[1395]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.544000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff2b000070 a2=0 a3=7fff2b00005c items=0 ppid=1353 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.544000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:42:47.545000 audit[1397]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.545000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc73f40d80 a2=0 a3=7ffc73f40d6c items=0 ppid=1353 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.545000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 10 00:42:47.565000 audit[1402]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.565000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdcc3efb00 a2=0 a3=7ffdcc3efaec items=0 ppid=1353 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.565000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 10 00:42:47.573000 audit[1404]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.573000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdac6b1fc0 a2=0 a3=7ffdac6b1fac items=0 ppid=1353 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.573000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 10 00:42:47.575000 audit[1406]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.575000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff7c47a4f0 a2=0 a3=7fff7c47a4dc items=0 ppid=1353 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.575000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 10 00:42:47.576000 audit[1408]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.576000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffceeaa95f0 a2=0 a3=7ffceeaa95dc items=0 ppid=1353 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.576000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:42:47.588000 audit[1412]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.588000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc658ec740 a2=0 a3=7ffc658ec72c items=0 ppid=1353 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.588000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:42:47.598000 audit[1413]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.598000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff0d842b90 a2=0 a3=7fff0d842b7c items=0 ppid=1353 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.598000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:42:47.609621 kernel: Initializing XFRM netlink socket May 10 00:42:47.638094 env[1353]: time="2025-05-10T00:42:47.638042266Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 10 00:42:47.654000 audit[1421]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.654000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe0a500860 a2=0 a3=7ffe0a50084c items=0 ppid=1353 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.654000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 10 00:42:47.668000 audit[1424]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.668000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdb71ced30 a2=0 a3=7ffdb71ced1c items=0 ppid=1353 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.668000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 10 00:42:47.672000 audit[1427]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.672000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc59623690 a2=0 a3=7ffc5962367c items=0 ppid=1353 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.672000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 10 00:42:47.674000 audit[1429]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.674000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffecf3157c0 a2=0 a3=7ffecf3157ac items=0 ppid=1353 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.674000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 10 00:42:47.676000 audit[1431]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.676000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe1e80f6a0 a2=0 a3=7ffe1e80f68c items=0 ppid=1353 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.676000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 10 00:42:47.679000 audit[1433]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.679000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd2b6fbb20 a2=0 a3=7ffd2b6fbb0c items=0 ppid=1353 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.679000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 10 00:42:47.681000 audit[1435]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.681000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff5d47dd20 a2=0 a3=7fff5d47dd0c items=0 ppid=1353 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.681000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 10 00:42:47.689000 audit[1438]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.689000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffebc00ed80 a2=0 a3=7ffebc00ed6c items=0 ppid=1353 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.689000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 10 00:42:47.691000 audit[1440]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.691000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff6da3b2b0 a2=0 a3=7fff6da3b29c items=0 ppid=1353 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.691000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:42:47.693000 audit[1442]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.693000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffff9caa010 a2=0 a3=7ffff9ca9ffc items=0 ppid=1353 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.693000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:42:47.695000 audit[1444]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.695000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe521b8320 a2=0 a3=7ffe521b830c items=0 ppid=1353 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.695000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 10 00:42:47.696608 systemd-networkd[1030]: docker0: Link UP May 10 00:42:47.706000 audit[1448]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.706000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcdefcbaa0 a2=0 a3=7ffcdefcba8c items=0 ppid=1353 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.706000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:42:47.712000 audit[1449]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:42:47.712000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff6e12b680 a2=0 a3=7fff6e12b66c items=0 ppid=1353 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:42:47.712000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:42:47.712933 env[1353]: time="2025-05-10T00:42:47.712895900Z" level=info msg="Loading containers: done." May 10 00:42:47.730577 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2207184170-merged.mount: Deactivated successfully. May 10 00:42:47.736484 env[1353]: time="2025-05-10T00:42:47.736413212Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 10 00:42:47.736743 env[1353]: time="2025-05-10T00:42:47.736706882Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 10 00:42:47.736856 env[1353]: time="2025-05-10T00:42:47.736835383Z" level=info msg="Daemon has completed initialization" May 10 00:42:47.756283 systemd[1]: Started docker.service. May 10 00:42:47.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:47.761015 env[1353]: time="2025-05-10T00:42:47.760915230Z" level=info msg="API listen on /run/docker.sock" May 10 00:42:48.743659 env[1202]: time="2025-05-10T00:42:48.743597862Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\"" May 10 00:42:49.525270 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3056092209.mount: Deactivated successfully. May 10 00:42:51.069470 env[1202]: time="2025-05-10T00:42:51.069376167Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:51.071678 env[1202]: time="2025-05-10T00:42:51.071631007Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:51.073635 env[1202]: time="2025-05-10T00:42:51.073604358Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:51.075371 env[1202]: time="2025-05-10T00:42:51.075330907Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:631c6cc78b2862be4fed7df3384a643ef7297eebadae22e8ef9cbe2e19b6386f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:51.076188 env[1202]: time="2025-05-10T00:42:51.076128823Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\" returns image reference \"sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5\"" May 10 00:42:51.076823 env[1202]: time="2025-05-10T00:42:51.076797568Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\"" May 10 00:42:53.061190 env[1202]: time="2025-05-10T00:42:53.061115221Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:53.064766 env[1202]: time="2025-05-10T00:42:53.064708370Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:53.066620 env[1202]: time="2025-05-10T00:42:53.066559492Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:53.069195 env[1202]: time="2025-05-10T00:42:53.069155542Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:25e29187ea66f0ff9b9a00114849c3a30b649005c900a8b2a69e3f3fa56448fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:53.069999 env[1202]: time="2025-05-10T00:42:53.069962736Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\" returns image reference \"sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a\"" May 10 00:42:53.070474 env[1202]: time="2025-05-10T00:42:53.070443398Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\"" May 10 00:42:54.831166 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 00:42:54.831419 systemd[1]: Stopped kubelet.service. May 10 00:42:54.831477 systemd[1]: kubelet.service: Consumed 1.990s CPU time. May 10 00:42:54.833244 systemd[1]: Starting kubelet.service... May 10 00:42:54.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:54.834679 kernel: kauditd_printk_skb: 84 callbacks suppressed May 10 00:42:54.834763 kernel: audit: type=1130 audit(1746837774.830:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:54.843242 kernel: audit: type=1131 audit(1746837774.830:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:54.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:55.009316 systemd[1]: Started kubelet.service. May 10 00:42:55.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:55.013574 kernel: audit: type=1130 audit(1746837775.006:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:42:55.117418 kubelet[1490]: E0510 00:42:55.117259 1490 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:42:55.123056 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:42:55.123190 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:42:55.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:42:55.127572 kernel: audit: type=1131 audit(1746837775.122:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:42:55.966837 env[1202]: time="2025-05-10T00:42:55.966699777Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:55.969905 env[1202]: time="2025-05-10T00:42:55.969851789Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:55.971966 env[1202]: time="2025-05-10T00:42:55.971900622Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:55.974328 env[1202]: time="2025-05-10T00:42:55.974288160Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09c55f8dac59a4b8e5e354140f5a4bdd6fa9bd95c42d6bcba6782ed37c31b5a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:55.974998 env[1202]: time="2025-05-10T00:42:55.974949190Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\" returns image reference \"sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000\"" May 10 00:42:55.975676 env[1202]: time="2025-05-10T00:42:55.975625459Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 10 00:42:57.113227 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1646152027.mount: Deactivated successfully. May 10 00:42:58.040007 env[1202]: time="2025-05-10T00:42:58.039929964Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:58.041833 env[1202]: time="2025-05-10T00:42:58.041797577Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:58.043461 env[1202]: time="2025-05-10T00:42:58.043421443Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:58.044910 env[1202]: time="2025-05-10T00:42:58.044862626Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:58.045366 env[1202]: time="2025-05-10T00:42:58.045312089Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3\"" May 10 00:42:58.045972 env[1202]: time="2025-05-10T00:42:58.045949856Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 10 00:42:58.751298 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount853605720.mount: Deactivated successfully. May 10 00:42:59.790162 env[1202]: time="2025-05-10T00:42:59.790062011Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:59.792209 env[1202]: time="2025-05-10T00:42:59.792185104Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:59.794361 env[1202]: time="2025-05-10T00:42:59.794321411Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:59.796360 env[1202]: time="2025-05-10T00:42:59.796328736Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:42:59.797299 env[1202]: time="2025-05-10T00:42:59.797233834Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 10 00:42:59.797879 env[1202]: time="2025-05-10T00:42:59.797856993Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 10 00:43:00.440570 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount266181821.mount: Deactivated successfully. May 10 00:43:00.446156 env[1202]: time="2025-05-10T00:43:00.446091395Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:00.447918 env[1202]: time="2025-05-10T00:43:00.447870242Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:00.449394 env[1202]: time="2025-05-10T00:43:00.449347953Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:00.458046 env[1202]: time="2025-05-10T00:43:00.458006544Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:00.458540 env[1202]: time="2025-05-10T00:43:00.458503046Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 10 00:43:00.458991 env[1202]: time="2025-05-10T00:43:00.458966174Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 10 00:43:01.046093 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1896829256.mount: Deactivated successfully. May 10 00:43:03.998525 env[1202]: time="2025-05-10T00:43:03.998441929Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:04.055892 env[1202]: time="2025-05-10T00:43:04.055824212Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:04.108995 env[1202]: time="2025-05-10T00:43:04.108916308Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:04.134465 env[1202]: time="2025-05-10T00:43:04.134417020Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:04.135374 env[1202]: time="2025-05-10T00:43:04.135332387Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" May 10 00:43:05.330975 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 10 00:43:05.331207 systemd[1]: Stopped kubelet.service. May 10 00:43:05.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:05.332879 systemd[1]: Starting kubelet.service... May 10 00:43:05.343583 kernel: audit: type=1130 audit(1746837785.330:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:05.343686 kernel: audit: type=1131 audit(1746837785.330:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:05.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:05.420638 systemd[1]: Started kubelet.service. May 10 00:43:05.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:05.424571 kernel: audit: type=1130 audit(1746837785.420:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:05.453763 kubelet[1522]: E0510 00:43:05.453699 1522 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:43:05.455866 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:43:05.455987 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:43:05.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:43:05.460565 kernel: audit: type=1131 audit(1746837785.455:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:43:06.571786 systemd[1]: Stopped kubelet.service. May 10 00:43:06.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:06.574051 systemd[1]: Starting kubelet.service... May 10 00:43:06.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:06.579573 kernel: audit: type=1130 audit(1746837786.571:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:06.579644 kernel: audit: type=1131 audit(1746837786.571:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:06.596854 systemd[1]: Reloading. May 10 00:43:06.670061 /usr/lib/systemd/system-generators/torcx-generator[1558]: time="2025-05-10T00:43:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:43:06.670091 /usr/lib/systemd/system-generators/torcx-generator[1558]: time="2025-05-10T00:43:06Z" level=info msg="torcx already run" May 10 00:43:07.154453 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:43:07.154471 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:43:07.180823 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:43:07.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.254697 kernel: audit: type=1400 audit(1746837787.248:249): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.254751 kernel: audit: type=1400 audit(1746837787.248:250): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.254777 kernel: audit: type=1400 audit(1746837787.248:251): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.257582 kernel: audit: type=1400 audit(1746837787.248:252): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.254000 audit: BPF prog-id=40 op=LOAD May 10 00:43:07.254000 audit: BPF prog-id=33 op=UNLOAD May 10 00:43:07.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.257000 audit: BPF prog-id=41 op=LOAD May 10 00:43:07.257000 audit: BPF prog-id=35 op=UNLOAD May 10 00:43:07.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.259000 audit: BPF prog-id=42 op=LOAD May 10 00:43:07.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.260000 audit: BPF prog-id=43 op=LOAD May 10 00:43:07.260000 audit: BPF prog-id=36 op=UNLOAD May 10 00:43:07.260000 audit: BPF prog-id=37 op=UNLOAD May 10 00:43:07.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit: BPF prog-id=44 op=LOAD May 10 00:43:07.261000 audit: BPF prog-id=24 op=UNLOAD May 10 00:43:07.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit: BPF prog-id=45 op=LOAD May 10 00:43:07.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.261000 audit: BPF prog-id=46 op=LOAD May 10 00:43:07.261000 audit: BPF prog-id=25 op=UNLOAD May 10 00:43:07.261000 audit: BPF prog-id=26 op=UNLOAD May 10 00:43:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit: BPF prog-id=47 op=LOAD May 10 00:43:07.263000 audit: BPF prog-id=27 op=UNLOAD May 10 00:43:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit: BPF prog-id=48 op=LOAD May 10 00:43:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.263000 audit: BPF prog-id=49 op=LOAD May 10 00:43:07.263000 audit: BPF prog-id=28 op=UNLOAD May 10 00:43:07.263000 audit: BPF prog-id=29 op=UNLOAD May 10 00:43:07.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit: BPF prog-id=50 op=LOAD May 10 00:43:07.265000 audit: BPF prog-id=38 op=UNLOAD May 10 00:43:07.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit: BPF prog-id=51 op=LOAD May 10 00:43:07.266000 audit: BPF prog-id=30 op=UNLOAD May 10 00:43:07.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit: BPF prog-id=52 op=LOAD May 10 00:43:07.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.266000 audit: BPF prog-id=53 op=LOAD May 10 00:43:07.266000 audit: BPF prog-id=31 op=UNLOAD May 10 00:43:07.266000 audit: BPF prog-id=32 op=UNLOAD May 10 00:43:07.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.268000 audit: BPF prog-id=54 op=LOAD May 10 00:43:07.268000 audit: BPF prog-id=34 op=UNLOAD May 10 00:43:07.278104 systemd[1]: Started kubelet.service. May 10 00:43:07.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:07.279521 systemd[1]: Stopping kubelet.service... May 10 00:43:07.279790 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:43:07.279952 systemd[1]: Stopped kubelet.service. May 10 00:43:07.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:07.281423 systemd[1]: Starting kubelet.service... May 10 00:43:07.368816 systemd[1]: Started kubelet.service. May 10 00:43:07.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:07.411791 kubelet[1606]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:43:07.411791 kubelet[1606]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 10 00:43:07.411791 kubelet[1606]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:43:07.411791 kubelet[1606]: I0510 00:43:07.411748 1606 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:43:07.700915 kubelet[1606]: I0510 00:43:07.700793 1606 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 10 00:43:07.700915 kubelet[1606]: I0510 00:43:07.700828 1606 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:43:07.701137 kubelet[1606]: I0510 00:43:07.701120 1606 server.go:954] "Client rotation is on, will bootstrap in background" May 10 00:43:07.722775 kubelet[1606]: E0510 00:43:07.722713 1606 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.88:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.88:6443: connect: connection refused" logger="UnhandledError" May 10 00:43:07.727009 kubelet[1606]: I0510 00:43:07.726763 1606 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:43:07.735986 kubelet[1606]: E0510 00:43:07.735920 1606 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 00:43:07.735986 kubelet[1606]: I0510 00:43:07.735960 1606 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 00:43:07.741494 kubelet[1606]: I0510 00:43:07.741450 1606 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:43:07.742808 kubelet[1606]: I0510 00:43:07.742745 1606 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:43:07.743066 kubelet[1606]: I0510 00:43:07.742796 1606 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 00:43:07.743214 kubelet[1606]: I0510 00:43:07.743069 1606 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:43:07.743214 kubelet[1606]: I0510 00:43:07.743082 1606 container_manager_linux.go:304] "Creating device plugin manager" May 10 00:43:07.743291 kubelet[1606]: I0510 00:43:07.743234 1606 state_mem.go:36] "Initialized new in-memory state store" May 10 00:43:07.746663 kubelet[1606]: I0510 00:43:07.746630 1606 kubelet.go:446] "Attempting to sync node with API server" May 10 00:43:07.746663 kubelet[1606]: I0510 00:43:07.746660 1606 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:43:07.746768 kubelet[1606]: I0510 00:43:07.746694 1606 kubelet.go:352] "Adding apiserver pod source" May 10 00:43:07.746895 kubelet[1606]: I0510 00:43:07.746882 1606 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:43:07.775612 kubelet[1606]: I0510 00:43:07.775568 1606 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:43:07.776095 kubelet[1606]: I0510 00:43:07.776050 1606 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:43:07.779275 kubelet[1606]: W0510 00:43:07.779207 1606 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.88:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.88:6443: connect: connection refused May 10 00:43:07.779275 kubelet[1606]: E0510 00:43:07.779275 1606 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.88:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.88:6443: connect: connection refused" logger="UnhandledError" May 10 00:43:07.782441 kubelet[1606]: W0510 00:43:07.782411 1606 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 00:43:07.783516 kubelet[1606]: W0510 00:43:07.783463 1606 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.88:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.88:6443: connect: connection refused May 10 00:43:07.783603 kubelet[1606]: E0510 00:43:07.783530 1606 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.88:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.88:6443: connect: connection refused" logger="UnhandledError" May 10 00:43:07.784617 kubelet[1606]: I0510 00:43:07.784593 1606 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 10 00:43:07.784677 kubelet[1606]: I0510 00:43:07.784655 1606 server.go:1287] "Started kubelet" May 10 00:43:07.784867 kubelet[1606]: I0510 00:43:07.784813 1606 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:43:07.785116 kubelet[1606]: I0510 00:43:07.785051 1606 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:43:07.785686 kubelet[1606]: I0510 00:43:07.785562 1606 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:43:07.785985 kubelet[1606]: I0510 00:43:07.785932 1606 server.go:490] "Adding debug handlers to kubelet server" May 10 00:43:07.790000 audit[1606]: AVC avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.790000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:43:07.790000 audit[1606]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c0ad80 a1=c000c20630 a2=c000c0ad50 a3=25 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:07.790000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:43:07.790000 audit[1606]: AVC avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:07.790000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:43:07.790000 audit[1606]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c54100 a1=c000c20648 a2=c000c0ae10 a3=25 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:07.790000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:43:07.791171 kubelet[1606]: I0510 00:43:07.790829 1606 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:43:07.791171 kubelet[1606]: I0510 00:43:07.790877 1606 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 10 00:43:07.791171 kubelet[1606]: I0510 00:43:07.790951 1606 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:43:07.792013 kubelet[1606]: I0510 00:43:07.791519 1606 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 00:43:07.792183 kubelet[1606]: E0510 00:43:07.790594 1606 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.88:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.88:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183e03b67d218fc1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-10 00:43:07.784613825 +0000 UTC m=+0.412767666,LastTimestamp:2025-05-10 00:43:07.784613825 +0000 UTC m=+0.412767666,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 10 00:43:07.793088 kubelet[1606]: E0510 00:43:07.793068 1606 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:43:07.793601 kubelet[1606]: E0510 00:43:07.793570 1606 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:43:07.793657 kubelet[1606]: I0510 00:43:07.793616 1606 volume_manager.go:297] "Starting Kubelet Volume Manager" May 10 00:43:07.793000 audit[1619]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1619 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:07.793000 audit[1619]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe16f480f0 a2=0 a3=7ffe16f480dc items=0 ppid=1606 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:07.793000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:43:07.794303 kubelet[1606]: E0510 00:43:07.794233 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.88:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.88:6443: connect: connection refused" interval="200ms" May 10 00:43:07.794437 kubelet[1606]: I0510 00:43:07.794412 1606 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:43:07.794516 kubelet[1606]: I0510 00:43:07.794494 1606 reconciler.go:26] "Reconciler: start to sync state" May 10 00:43:07.795085 kubelet[1606]: I0510 00:43:07.795069 1606 factory.go:221] Registration of the systemd container factory successfully May 10 00:43:07.795263 kubelet[1606]: I0510 00:43:07.795242 1606 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:43:07.795574 kubelet[1606]: W0510 00:43:07.795071 1606 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.88:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.88:6443: connect: connection refused May 10 00:43:07.794000 audit[1620]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1620 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:07.794000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4db57b70 a2=0 a3=7ffc4db57b5c items=0 ppid=1606 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:07.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:43:07.795766 kubelet[1606]: E0510 00:43:07.795592 1606 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.88:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.88:6443: connect: connection refused" logger="UnhandledError" May 10 00:43:07.796585 kubelet[1606]: I0510 00:43:07.796567 1606 factory.go:221] Registration of the containerd container factory successfully May 10 00:43:07.797000 audit[1623]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1623 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:07.797000 audit[1623]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff2a820520 a2=0 a3=7fff2a82050c items=0 ppid=1606 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:07.797000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:43:07.799000 audit[1625]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:07.799000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffec1b4c750 a2=0 a3=7ffec1b4c73c items=0 ppid=1606 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:07.799000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:43:07.806000 audit[1630]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:07.806000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffbd47f780 a2=0 a3=7fffbd47f76c items=0 ppid=1606 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:07.806000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 00:43:07.807164 kubelet[1606]: I0510 00:43:07.807106 1606 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:43:07.807000 audit[1633]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:07.807000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdce671ee0 a2=0 a3=7ffdce671ecc items=0 ppid=1606 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:07.807000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:43:07.807000 audit[1632]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:07.807000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdbe47cb30 a2=0 a3=10e3 items=0 ppid=1606 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:07.807000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:43:07.808386 kubelet[1606]: I0510 00:43:07.808356 1606 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:43:07.808427 kubelet[1606]: I0510 00:43:07.808396 1606 status_manager.go:227] "Starting to sync pod status with apiserver" May 10 00:43:07.808461 kubelet[1606]: I0510 00:43:07.808439 1606 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 10 00:43:07.808461 kubelet[1606]: I0510 00:43:07.808452 1606 kubelet.go:2388] "Starting kubelet main sync loop" May 10 00:43:07.808536 kubelet[1606]: E0510 00:43:07.808511 1606 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:43:07.808000 audit[1634]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:07.808000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcbb6a920 a2=0 a3=7fffcbb6a90c items=0 ppid=1606 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:07.808000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:43:07.809000 audit[1635]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:07.809000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec08b7320 a2=0 a3=7ffec08b730c items=0 ppid=1606 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:07.809000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:43:07.809000 audit[1636]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1636 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:07.809000 audit[1636]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8472c940 a2=0 a3=7ffe8472c92c items=0 ppid=1606 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:07.809000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:43:07.810722 kubelet[1606]: W0510 00:43:07.810691 1606 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.88:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.88:6443: connect: connection refused May 10 00:43:07.810000 audit[1637]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1637 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:07.810000 audit[1637]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff392bda40 a2=0 a3=7fff392bda2c items=0 ppid=1606 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:07.810000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:43:07.810940 kubelet[1606]: E0510 00:43:07.810745 1606 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.88:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.88:6443: connect: connection refused" logger="UnhandledError" May 10 00:43:07.810940 kubelet[1606]: I0510 00:43:07.810804 1606 cpu_manager.go:221] "Starting CPU manager" policy="none" May 10 00:43:07.810940 kubelet[1606]: I0510 00:43:07.810810 1606 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 10 00:43:07.810940 kubelet[1606]: I0510 00:43:07.810827 1606 state_mem.go:36] "Initialized new in-memory state store" May 10 00:43:07.811000 audit[1638]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1638 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:07.811000 audit[1638]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc0967a040 a2=0 a3=7ffc0967a02c items=0 ppid=1606 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:07.811000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:43:07.894204 kubelet[1606]: E0510 00:43:07.894157 1606 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:43:07.909418 kubelet[1606]: E0510 00:43:07.909383 1606 kubelet.go:2412] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 10 00:43:07.994827 kubelet[1606]: E0510 00:43:07.994682 1606 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:43:07.995213 kubelet[1606]: E0510 00:43:07.995131 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.88:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.88:6443: connect: connection refused" interval="400ms" May 10 00:43:08.012511 kubelet[1606]: I0510 00:43:08.012469 1606 policy_none.go:49] "None policy: Start" May 10 00:43:08.012511 kubelet[1606]: I0510 00:43:08.012503 1606 memory_manager.go:186] "Starting memorymanager" policy="None" May 10 00:43:08.012607 kubelet[1606]: I0510 00:43:08.012521 1606 state_mem.go:35] "Initializing new in-memory state store" May 10 00:43:08.017347 systemd[1]: Created slice kubepods.slice. May 10 00:43:08.021066 systemd[1]: Created slice kubepods-burstable.slice. May 10 00:43:08.023299 systemd[1]: Created slice kubepods-besteffort.slice. May 10 00:43:08.028213 kubelet[1606]: I0510 00:43:08.028172 1606 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:43:08.027000 audit[1606]: AVC avc: denied { mac_admin } for pid=1606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:08.027000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:43:08.027000 audit[1606]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00092eff0 a1=c000f281b0 a2=c00092ef90 a3=25 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:08.027000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:43:08.029073 kubelet[1606]: I0510 00:43:08.028253 1606 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:43:08.029073 kubelet[1606]: I0510 00:43:08.028388 1606 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 00:43:08.029073 kubelet[1606]: I0510 00:43:08.028405 1606 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:43:08.029073 kubelet[1606]: I0510 00:43:08.028707 1606 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:43:08.029398 kubelet[1606]: E0510 00:43:08.029312 1606 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 10 00:43:08.029398 kubelet[1606]: E0510 00:43:08.029374 1606 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 10 00:43:08.117037 systemd[1]: Created slice kubepods-burstable-pod5386fe11ed933ab82453de11903c7f47.slice. May 10 00:43:08.129514 kubelet[1606]: I0510 00:43:08.129476 1606 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 10 00:43:08.130004 kubelet[1606]: E0510 00:43:08.129948 1606 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.88:6443/api/v1/nodes\": dial tcp 10.0.0.88:6443: connect: connection refused" node="localhost" May 10 00:43:08.136707 kubelet[1606]: E0510 00:43:08.136686 1606 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 10 00:43:08.139452 systemd[1]: Created slice kubepods-burstable-pod2980a8ab51edc665be10a02e33130e15.slice. May 10 00:43:08.146339 kubelet[1606]: E0510 00:43:08.146313 1606 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 10 00:43:08.148085 systemd[1]: Created slice kubepods-burstable-pod48bc0c31b0630eccea6bdbcb0e9db7bc.slice. May 10 00:43:08.149232 kubelet[1606]: E0510 00:43:08.149207 1606 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 10 00:43:08.197667 kubelet[1606]: I0510 00:43:08.197629 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:43:08.197721 kubelet[1606]: I0510 00:43:08.197686 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 10 00:43:08.197721 kubelet[1606]: I0510 00:43:08.197713 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/48bc0c31b0630eccea6bdbcb0e9db7bc-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"48bc0c31b0630eccea6bdbcb0e9db7bc\") " pod="kube-system/kube-apiserver-localhost" May 10 00:43:08.197775 kubelet[1606]: I0510 00:43:08.197728 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/48bc0c31b0630eccea6bdbcb0e9db7bc-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"48bc0c31b0630eccea6bdbcb0e9db7bc\") " pod="kube-system/kube-apiserver-localhost" May 10 00:43:08.197775 kubelet[1606]: I0510 00:43:08.197740 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/48bc0c31b0630eccea6bdbcb0e9db7bc-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"48bc0c31b0630eccea6bdbcb0e9db7bc\") " pod="kube-system/kube-apiserver-localhost" May 10 00:43:08.197775 kubelet[1606]: I0510 00:43:08.197756 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:43:08.197842 kubelet[1606]: I0510 00:43:08.197773 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:43:08.197842 kubelet[1606]: I0510 00:43:08.197805 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:43:08.197842 kubelet[1606]: I0510 00:43:08.197826 1606 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:43:08.331819 kubelet[1606]: I0510 00:43:08.331795 1606 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 10 00:43:08.332099 kubelet[1606]: E0510 00:43:08.332077 1606 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.88:6443/api/v1/nodes\": dial tcp 10.0.0.88:6443: connect: connection refused" node="localhost" May 10 00:43:08.395686 kubelet[1606]: E0510 00:43:08.395648 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.88:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.88:6443: connect: connection refused" interval="800ms" May 10 00:43:08.438065 kubelet[1606]: E0510 00:43:08.438037 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:08.438684 env[1202]: time="2025-05-10T00:43:08.438645692Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,}" May 10 00:43:08.446864 kubelet[1606]: E0510 00:43:08.446843 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:08.447243 env[1202]: time="2025-05-10T00:43:08.447206290Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,}" May 10 00:43:08.450398 kubelet[1606]: E0510 00:43:08.450374 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:08.450676 env[1202]: time="2025-05-10T00:43:08.450641663Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:48bc0c31b0630eccea6bdbcb0e9db7bc,Namespace:kube-system,Attempt:0,}" May 10 00:43:08.719290 kubelet[1606]: W0510 00:43:08.719126 1606 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.88:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.88:6443: connect: connection refused May 10 00:43:08.719290 kubelet[1606]: E0510 00:43:08.719206 1606 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.88:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.88:6443: connect: connection refused" logger="UnhandledError" May 10 00:43:08.734013 kubelet[1606]: I0510 00:43:08.733961 1606 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 10 00:43:08.734447 kubelet[1606]: E0510 00:43:08.734389 1606 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.88:6443/api/v1/nodes\": dial tcp 10.0.0.88:6443: connect: connection refused" node="localhost" May 10 00:43:08.956667 kubelet[1606]: W0510 00:43:08.956623 1606 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.88:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.88:6443: connect: connection refused May 10 00:43:08.956834 kubelet[1606]: E0510 00:43:08.956673 1606 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.88:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.88:6443: connect: connection refused" logger="UnhandledError" May 10 00:43:09.096034 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4024003009.mount: Deactivated successfully. May 10 00:43:09.104582 env[1202]: time="2025-05-10T00:43:09.104497410Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:09.107111 env[1202]: time="2025-05-10T00:43:09.107063313Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:09.108215 env[1202]: time="2025-05-10T00:43:09.108176711Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:09.109962 env[1202]: time="2025-05-10T00:43:09.109908510Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:09.111683 env[1202]: time="2025-05-10T00:43:09.111642933Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:09.113129 env[1202]: time="2025-05-10T00:43:09.113097852Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:09.115045 env[1202]: time="2025-05-10T00:43:09.114990983Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:09.117634 env[1202]: time="2025-05-10T00:43:09.117592593Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:09.119145 env[1202]: time="2025-05-10T00:43:09.119097295Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:09.122755 env[1202]: time="2025-05-10T00:43:09.122717926Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:09.123953 env[1202]: time="2025-05-10T00:43:09.123906806Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:09.125524 env[1202]: time="2025-05-10T00:43:09.125496368Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:09.150045 env[1202]: time="2025-05-10T00:43:09.149961738Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:43:09.150210 env[1202]: time="2025-05-10T00:43:09.150097503Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:43:09.150210 env[1202]: time="2025-05-10T00:43:09.150133560Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:43:09.150521 env[1202]: time="2025-05-10T00:43:09.150448791Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a89c2619c9c613d1af110c8c3b60d2420232cc494678b4dd8654f2dfe0f49fae pid=1648 runtime=io.containerd.runc.v2 May 10 00:43:09.166624 systemd[1]: Started cri-containerd-a89c2619c9c613d1af110c8c3b60d2420232cc494678b4dd8654f2dfe0f49fae.scope. May 10 00:43:09.171108 env[1202]: time="2025-05-10T00:43:09.169924041Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:43:09.171108 env[1202]: time="2025-05-10T00:43:09.169978594Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:43:09.171108 env[1202]: time="2025-05-10T00:43:09.169993271Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:43:09.171108 env[1202]: time="2025-05-10T00:43:09.170130158Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ef4feca9f1cb7d448276fdb8a047d5eacf930436f6848c18d992308b72366c30 pid=1683 runtime=io.containerd.runc.v2 May 10 00:43:09.176074 env[1202]: time="2025-05-10T00:43:09.175887297Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:43:09.176074 env[1202]: time="2025-05-10T00:43:09.175926761Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:43:09.176074 env[1202]: time="2025-05-10T00:43:09.175946618Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:43:09.176291 env[1202]: time="2025-05-10T00:43:09.176139089Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/655931bf60ceb5ca34cdb2bc3d0f73542fd95b14b7a7d2be33060688a9b67a9e pid=1675 runtime=io.containerd.runc.v2 May 10 00:43:09.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit: BPF prog-id=55 op=LOAD May 10 00:43:09.177000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1648 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138396332363139633963363133643161663131306338633362363064 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1648 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138396332363139633963363133643161663131306338633362363064 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit: BPF prog-id=56 op=LOAD May 10 00:43:09.177000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001c8150 items=0 ppid=1648 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138396332363139633963363133643161663131306338633362363064 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.177000 audit: BPF prog-id=57 op=LOAD May 10 00:43:09.177000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001c8198 items=0 ppid=1648 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138396332363139633963363133643161663131306338633362363064 May 10 00:43:09.177000 audit: BPF prog-id=57 op=UNLOAD May 10 00:43:09.178000 audit: BPF prog-id=56 op=UNLOAD May 10 00:43:09.178000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.178000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.178000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.178000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.178000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.178000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.178000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.178000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.178000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.178000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.178000 audit: BPF prog-id=58 op=LOAD May 10 00:43:09.178000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c85a8 items=0 ppid=1648 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138396332363139633963363133643161663131306338633362363064 May 10 00:43:09.185462 systemd[1]: Started cri-containerd-ef4feca9f1cb7d448276fdb8a047d5eacf930436f6848c18d992308b72366c30.scope. May 10 00:43:09.196625 systemd[1]: Started cri-containerd-655931bf60ceb5ca34cdb2bc3d0f73542fd95b14b7a7d2be33060688a9b67a9e.scope. May 10 00:43:09.198926 kubelet[1606]: E0510 00:43:09.198889 1606 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.88:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.88:6443: connect: connection refused" interval="1.6s" May 10 00:43:09.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.200000 audit: BPF prog-id=59 op=LOAD May 10 00:43:09.201000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=1683 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566346665636139663163623764343438323736666462386130343764 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=1683 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566346665636139663163623764343438323736666462386130343764 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit: BPF prog-id=60 op=LOAD May 10 00:43:09.201000 audit[1701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0003ee8a0 items=0 ppid=1683 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566346665636139663163623764343438323736666462386130343764 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit: BPF prog-id=61 op=LOAD May 10 00:43:09.201000 audit[1701]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0003ee8e8 items=0 ppid=1683 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566346665636139663163623764343438323736666462386130343764 May 10 00:43:09.201000 audit: BPF prog-id=61 op=UNLOAD May 10 00:43:09.201000 audit: BPF prog-id=60 op=UNLOAD May 10 00:43:09.201000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.201000 audit: BPF prog-id=62 op=LOAD May 10 00:43:09.201000 audit[1701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003eecf8 items=0 ppid=1683 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566346665636139663163623764343438323736666462386130343764 May 10 00:43:09.205234 env[1202]: time="2025-05-10T00:43:09.201902754Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,} returns sandbox id \"a89c2619c9c613d1af110c8c3b60d2420232cc494678b4dd8654f2dfe0f49fae\"" May 10 00:43:09.205234 env[1202]: time="2025-05-10T00:43:09.204391763Z" level=info msg="CreateContainer within sandbox \"a89c2619c9c613d1af110c8c3b60d2420232cc494678b4dd8654f2dfe0f49fae\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 10 00:43:09.205330 kubelet[1606]: E0510 00:43:09.202911 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:09.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.213000 audit: BPF prog-id=63 op=LOAD May 10 00:43:09.214000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1675 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635353933316266363063656235636133346364623262633364306637 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1675 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635353933316266363063656235636133346364623262633364306637 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit: BPF prog-id=64 op=LOAD May 10 00:43:09.214000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000304b40 items=0 ppid=1675 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635353933316266363063656235636133346364623262633364306637 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit: BPF prog-id=65 op=LOAD May 10 00:43:09.214000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000304b88 items=0 ppid=1675 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635353933316266363063656235636133346364623262633364306637 May 10 00:43:09.214000 audit: BPF prog-id=65 op=UNLOAD May 10 00:43:09.214000 audit: BPF prog-id=64 op=UNLOAD May 10 00:43:09.214000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.214000 audit: BPF prog-id=66 op=LOAD May 10 00:43:09.214000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000304f98 items=0 ppid=1675 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635353933316266363063656235636133346364623262633364306637 May 10 00:43:09.223242 env[1202]: time="2025-05-10T00:43:09.223197577Z" level=info msg="CreateContainer within sandbox \"a89c2619c9c613d1af110c8c3b60d2420232cc494678b4dd8654f2dfe0f49fae\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"3a6f5579d66e9cb36be8db67133908583a5d917584f7c4aec3b8df923433f8e6\"" May 10 00:43:09.223977 env[1202]: time="2025-05-10T00:43:09.223919482Z" level=info msg="StartContainer for \"3a6f5579d66e9cb36be8db67133908583a5d917584f7c4aec3b8df923433f8e6\"" May 10 00:43:09.228564 env[1202]: time="2025-05-10T00:43:09.228512747Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:48bc0c31b0630eccea6bdbcb0e9db7bc,Namespace:kube-system,Attempt:0,} returns sandbox id \"ef4feca9f1cb7d448276fdb8a047d5eacf930436f6848c18d992308b72366c30\"" May 10 00:43:09.229314 kubelet[1606]: E0510 00:43:09.229280 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:09.231458 env[1202]: time="2025-05-10T00:43:09.231292912Z" level=info msg="CreateContainer within sandbox \"ef4feca9f1cb7d448276fdb8a047d5eacf930436f6848c18d992308b72366c30\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 10 00:43:09.236654 kubelet[1606]: W0510 00:43:09.236532 1606 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.88:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.88:6443: connect: connection refused May 10 00:43:09.236747 kubelet[1606]: E0510 00:43:09.236664 1606 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.88:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.88:6443: connect: connection refused" logger="UnhandledError" May 10 00:43:09.240875 systemd[1]: Started cri-containerd-3a6f5579d66e9cb36be8db67133908583a5d917584f7c4aec3b8df923433f8e6.scope. May 10 00:43:09.249601 env[1202]: time="2025-05-10T00:43:09.249555087Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,} returns sandbox id \"655931bf60ceb5ca34cdb2bc3d0f73542fd95b14b7a7d2be33060688a9b67a9e\"" May 10 00:43:09.250852 kubelet[1606]: E0510 00:43:09.250819 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:09.252888 env[1202]: time="2025-05-10T00:43:09.252844436Z" level=info msg="CreateContainer within sandbox \"655931bf60ceb5ca34cdb2bc3d0f73542fd95b14b7a7d2be33060688a9b67a9e\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 10 00:43:09.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit: BPF prog-id=67 op=LOAD May 10 00:43:09.257265 env[1202]: time="2025-05-10T00:43:09.255645601Z" level=info msg="CreateContainer within sandbox \"ef4feca9f1cb7d448276fdb8a047d5eacf930436f6848c18d992308b72366c30\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"cbcb014985d3ab041dc40fae639637637b62358ea0b896f692d28257f39a4bab\"" May 10 00:43:09.257265 env[1202]: time="2025-05-10T00:43:09.256312502Z" level=info msg="StartContainer for \"cbcb014985d3ab041dc40fae639637637b62358ea0b896f692d28257f39a4bab\"" May 10 00:43:09.256000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1648 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361366635353739643636653963623336626538646236373133333930 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1648 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361366635353739643636653963623336626538646236373133333930 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit: BPF prog-id=68 op=LOAD May 10 00:43:09.256000 audit[1762]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009f1e0 items=0 ppid=1648 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361366635353739643636653963623336626538646236373133333930 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.256000 audit: BPF prog-id=69 op=LOAD May 10 00:43:09.256000 audit[1762]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009f228 items=0 ppid=1648 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361366635353739643636653963623336626538646236373133333930 May 10 00:43:09.256000 audit: BPF prog-id=69 op=UNLOAD May 10 00:43:09.256000 audit: BPF prog-id=68 op=UNLOAD May 10 00:43:09.257000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.257000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.257000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.257000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.257000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.257000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.257000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.257000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.257000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.257000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.257000 audit: BPF prog-id=70 op=LOAD May 10 00:43:09.257000 audit[1762]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009f638 items=0 ppid=1648 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361366635353739643636653963623336626538646236373133333930 May 10 00:43:09.267509 env[1202]: time="2025-05-10T00:43:09.267452226Z" level=info msg="CreateContainer within sandbox \"655931bf60ceb5ca34cdb2bc3d0f73542fd95b14b7a7d2be33060688a9b67a9e\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"5ea9e7446f1616d8d2f824cbdfc843332e4356770721f6f6e4a5f04e67111068\"" May 10 00:43:09.268101 env[1202]: time="2025-05-10T00:43:09.268031152Z" level=info msg="StartContainer for \"5ea9e7446f1616d8d2f824cbdfc843332e4356770721f6f6e4a5f04e67111068\"" May 10 00:43:09.272201 systemd[1]: Started cri-containerd-cbcb014985d3ab041dc40fae639637637b62358ea0b896f692d28257f39a4bab.scope. May 10 00:43:09.287574 kubelet[1606]: W0510 00:43:09.285104 1606 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.88:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.88:6443: connect: connection refused May 10 00:43:09.287574 kubelet[1606]: E0510 00:43:09.285198 1606 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.88:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.88:6443: connect: connection refused" logger="UnhandledError" May 10 00:43:09.287811 systemd[1]: Started cri-containerd-5ea9e7446f1616d8d2f824cbdfc843332e4356770721f6f6e4a5f04e67111068.scope. May 10 00:43:09.288101 env[1202]: time="2025-05-10T00:43:09.288056093Z" level=info msg="StartContainer for \"3a6f5579d66e9cb36be8db67133908583a5d917584f7c4aec3b8df923433f8e6\" returns successfully" May 10 00:43:09.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit: BPF prog-id=71 op=LOAD May 10 00:43:09.290000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1683 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362636230313439383564336162303431646334306661653633393633 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1683 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362636230313439383564336162303431646334306661653633393633 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit: BPF prog-id=72 op=LOAD May 10 00:43:09.290000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024aa0 items=0 ppid=1683 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362636230313439383564336162303431646334306661653633393633 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.290000 audit: BPF prog-id=73 op=LOAD May 10 00:43:09.290000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024ae8 items=0 ppid=1683 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362636230313439383564336162303431646334306661653633393633 May 10 00:43:09.290000 audit: BPF prog-id=73 op=UNLOAD May 10 00:43:09.291000 audit: BPF prog-id=72 op=UNLOAD May 10 00:43:09.291000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.291000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.291000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.291000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.291000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.291000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.291000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.291000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.291000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.291000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.291000 audit: BPF prog-id=74 op=LOAD May 10 00:43:09.291000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024ef8 items=0 ppid=1683 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362636230313439383564336162303431646334306661653633393633 May 10 00:43:09.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.300000 audit: BPF prog-id=75 op=LOAD May 10 00:43:09.301000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1675 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613965373434366631363136643864326638323463626466633834 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1675 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613965373434366631363136643864326638323463626466633834 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit: BPF prog-id=76 op=LOAD May 10 00:43:09.301000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001bd600 items=0 ppid=1675 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613965373434366631363136643864326638323463626466633834 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit: BPF prog-id=77 op=LOAD May 10 00:43:09.301000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001bd648 items=0 ppid=1675 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613965373434366631363136643864326638323463626466633834 May 10 00:43:09.301000 audit: BPF prog-id=77 op=UNLOAD May 10 00:43:09.301000 audit: BPF prog-id=76 op=UNLOAD May 10 00:43:09.301000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:09.301000 audit: BPF prog-id=78 op=LOAD May 10 00:43:09.301000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001bda58 items=0 ppid=1675 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:09.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613965373434366631363136643864326638323463626466633834 May 10 00:43:09.317637 env[1202]: time="2025-05-10T00:43:09.317592976Z" level=info msg="StartContainer for \"cbcb014985d3ab041dc40fae639637637b62358ea0b896f692d28257f39a4bab\" returns successfully" May 10 00:43:09.329730 env[1202]: time="2025-05-10T00:43:09.329682843Z" level=info msg="StartContainer for \"5ea9e7446f1616d8d2f824cbdfc843332e4356770721f6f6e4a5f04e67111068\" returns successfully" May 10 00:43:09.536586 kubelet[1606]: I0510 00:43:09.536465 1606 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 10 00:43:09.819280 kubelet[1606]: E0510 00:43:09.819133 1606 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 10 00:43:09.819440 kubelet[1606]: E0510 00:43:09.819353 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:09.819617 kubelet[1606]: E0510 00:43:09.819590 1606 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 10 00:43:09.819717 kubelet[1606]: E0510 00:43:09.819689 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:09.821091 kubelet[1606]: E0510 00:43:09.821065 1606 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 10 00:43:09.821159 kubelet[1606]: E0510 00:43:09.821143 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:10.275000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:43:10.275000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0002d0660 a2=fc6 a3=0 items=0 ppid=1675 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 key=(null) May 10 00:43:10.275000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:43:10.275000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:43:10.275000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0000fc180 a2=fc6 a3=0 items=0 ppid=1675 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 key=(null) May 10 00:43:10.275000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:43:10.459000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:43:10.461104 kernel: kauditd_printk_skb: 567 callbacks suppressed May 10 00:43:10.461158 kernel: audit: type=1400 audit(1746837790.459:549): avc: denied { watch } for pid=1816 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:43:10.459000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0079d5620 a2=fc6 a3=0 items=0 ppid=1683 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 key=(null) May 10 00:43:10.469514 kernel: audit: type=1300 audit(1746837790.459:549): arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0079d5620 a2=fc6 a3=0 items=0 ppid=1683 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 key=(null) May 10 00:43:10.469555 kernel: audit: type=1327 audit(1746837790.459:549): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3838002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:43:10.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3838002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:43:10.459000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:43:10.477080 kernel: audit: type=1400 audit(1746837790.459:550): avc: denied { watch } for pid=1816 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:43:10.477124 kernel: audit: type=1300 audit(1746837790.459:550): arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c004b0e260 a2=fc6 a3=0 items=0 ppid=1683 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 key=(null) May 10 00:43:10.459000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c004b0e260 a2=fc6 a3=0 items=0 ppid=1683 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 key=(null) May 10 00:43:10.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3838002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:43:10.485768 kernel: audit: type=1327 audit(1746837790.459:550): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3838002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:43:10.485806 kernel: audit: type=1400 audit(1746837790.460:551): avc: denied { watch } for pid=1816 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:43:10.460000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:43:10.489435 kernel: audit: type=1300 audit(1746837790.460:551): arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c006c0a0c0 a2=fc6 a3=0 items=0 ppid=1683 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 key=(null) May 10 00:43:10.460000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c006c0a0c0 a2=fc6 a3=0 items=0 ppid=1683 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 key=(null) May 10 00:43:10.494126 kernel: audit: type=1327 audit(1746837790.460:551): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3838002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:43:10.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3838002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:43:10.499000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:43:10.507679 kernel: audit: type=1400 audit(1746837790.499:552): avc: denied { watch } for pid=1816 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:43:10.499000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c0079d57a0 a2=fc6 a3=0 items=0 ppid=1683 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 key=(null) May 10 00:43:10.499000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3838002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:43:10.499000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:43:10.499000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00441d9a0 a2=fc6 a3=0 items=0 ppid=1683 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 key=(null) May 10 00:43:10.499000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3838002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:43:10.499000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:43:10.499000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c006b00960 a2=fc6 a3=0 items=0 ppid=1683 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 key=(null) May 10 00:43:10.499000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3838002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:43:10.631341 kubelet[1606]: I0510 00:43:10.631299 1606 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 10 00:43:10.631813 kubelet[1606]: E0510 00:43:10.631795 1606 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 10 00:43:10.635627 kubelet[1606]: E0510 00:43:10.635608 1606 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:43:10.736244 kubelet[1606]: E0510 00:43:10.736191 1606 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:43:10.823022 kubelet[1606]: E0510 00:43:10.822990 1606 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 10 00:43:10.823164 kubelet[1606]: E0510 00:43:10.822996 1606 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 10 00:43:10.823164 kubelet[1606]: E0510 00:43:10.823142 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:10.823209 kubelet[1606]: E0510 00:43:10.823194 1606 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:10.837126 kubelet[1606]: E0510 00:43:10.837105 1606 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:43:10.938233 kubelet[1606]: E0510 00:43:10.938086 1606 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:43:11.039007 kubelet[1606]: E0510 00:43:11.038949 1606 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:43:11.139762 kubelet[1606]: E0510 00:43:11.139700 1606 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:43:11.240346 kubelet[1606]: E0510 00:43:11.240199 1606 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:43:11.341410 kubelet[1606]: E0510 00:43:11.341326 1606 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:43:11.442041 kubelet[1606]: E0510 00:43:11.441979 1606 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:43:11.542909 kubelet[1606]: E0510 00:43:11.542776 1606 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:43:11.643487 kubelet[1606]: E0510 00:43:11.643424 1606 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:43:11.744187 kubelet[1606]: E0510 00:43:11.744126 1606 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 00:43:11.894984 kubelet[1606]: I0510 00:43:11.894948 1606 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 10 00:43:11.901751 kubelet[1606]: I0510 00:43:11.901717 1606 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 10 00:43:11.904772 kubelet[1606]: I0510 00:43:11.904755 1606 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 10 00:43:12.315331 systemd[1]: Reloading. May 10 00:43:12.378983 /usr/lib/systemd/system-generators/torcx-generator[1901]: time="2025-05-10T00:43:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:43:12.379319 /usr/lib/systemd/system-generators/torcx-generator[1901]: time="2025-05-10T00:43:12Z" level=info msg="torcx already run" May 10 00:43:12.440728 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:43:12.440747 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:43:12.458163 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:43:12.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit: BPF prog-id=79 op=LOAD May 10 00:43:12.528000 audit: BPF prog-id=40 op=UNLOAD May 10 00:43:12.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.528000 audit: BPF prog-id=80 op=LOAD May 10 00:43:12.528000 audit: BPF prog-id=67 op=UNLOAD May 10 00:43:12.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.529000 audit: BPF prog-id=81 op=LOAD May 10 00:43:12.529000 audit: BPF prog-id=41 op=UNLOAD May 10 00:43:12.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.530000 audit: BPF prog-id=82 op=LOAD May 10 00:43:12.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.530000 audit: BPF prog-id=83 op=LOAD May 10 00:43:12.530000 audit: BPF prog-id=42 op=UNLOAD May 10 00:43:12.530000 audit: BPF prog-id=43 op=UNLOAD May 10 00:43:12.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit: BPF prog-id=84 op=LOAD May 10 00:43:12.531000 audit: BPF prog-id=44 op=UNLOAD May 10 00:43:12.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit: BPF prog-id=85 op=LOAD May 10 00:43:12.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.531000 audit: BPF prog-id=86 op=LOAD May 10 00:43:12.531000 audit: BPF prog-id=45 op=UNLOAD May 10 00:43:12.531000 audit: BPF prog-id=46 op=UNLOAD May 10 00:43:12.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit: BPF prog-id=87 op=LOAD May 10 00:43:12.532000 audit: BPF prog-id=71 op=UNLOAD May 10 00:43:12.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.532000 audit: BPF prog-id=88 op=LOAD May 10 00:43:12.532000 audit: BPF prog-id=63 op=UNLOAD May 10 00:43:12.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.533000 audit: BPF prog-id=89 op=LOAD May 10 00:43:12.534000 audit: BPF prog-id=59 op=UNLOAD May 10 00:43:12.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit: BPF prog-id=90 op=LOAD May 10 00:43:12.535000 audit: BPF prog-id=47 op=UNLOAD May 10 00:43:12.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit: BPF prog-id=91 op=LOAD May 10 00:43:12.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.535000 audit: BPF prog-id=92 op=LOAD May 10 00:43:12.535000 audit: BPF prog-id=48 op=UNLOAD May 10 00:43:12.535000 audit: BPF prog-id=49 op=UNLOAD May 10 00:43:12.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.536000 audit: BPF prog-id=93 op=LOAD May 10 00:43:12.536000 audit: BPF prog-id=75 op=UNLOAD May 10 00:43:12.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.537000 audit: BPF prog-id=94 op=LOAD May 10 00:43:12.537000 audit: BPF prog-id=50 op=UNLOAD May 10 00:43:12.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit: BPF prog-id=95 op=LOAD May 10 00:43:12.538000 audit: BPF prog-id=51 op=UNLOAD May 10 00:43:12.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit: BPF prog-id=96 op=LOAD May 10 00:43:12.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.538000 audit: BPF prog-id=97 op=LOAD May 10 00:43:12.538000 audit: BPF prog-id=52 op=UNLOAD May 10 00:43:12.538000 audit: BPF prog-id=53 op=UNLOAD May 10 00:43:12.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.539000 audit: BPF prog-id=98 op=LOAD May 10 00:43:12.539000 audit: BPF prog-id=55 op=UNLOAD May 10 00:43:12.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.540000 audit: BPF prog-id=99 op=LOAD May 10 00:43:12.541000 audit: BPF prog-id=54 op=UNLOAD May 10 00:43:12.551029 systemd[1]: Stopping kubelet.service... May 10 00:43:12.577786 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:43:12.577974 systemd[1]: Stopped kubelet.service. May 10 00:43:12.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:12.579749 systemd[1]: Starting kubelet.service... May 10 00:43:12.663662 systemd[1]: Started kubelet.service. May 10 00:43:12.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:12.693920 kubelet[1947]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:43:12.693920 kubelet[1947]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 10 00:43:12.693920 kubelet[1947]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:43:12.694282 kubelet[1947]: I0510 00:43:12.693996 1947 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:43:12.702665 kubelet[1947]: I0510 00:43:12.702627 1947 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 10 00:43:12.702665 kubelet[1947]: I0510 00:43:12.702655 1947 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:43:12.702948 kubelet[1947]: I0510 00:43:12.702927 1947 server.go:954] "Client rotation is on, will bootstrap in background" May 10 00:43:12.704122 kubelet[1947]: I0510 00:43:12.704097 1947 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 10 00:43:12.707234 kubelet[1947]: I0510 00:43:12.707129 1947 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:43:12.710654 kubelet[1947]: E0510 00:43:12.710599 1947 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 00:43:12.710654 kubelet[1947]: I0510 00:43:12.710630 1947 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 00:43:12.715290 kubelet[1947]: I0510 00:43:12.715264 1947 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:43:12.715494 kubelet[1947]: I0510 00:43:12.715455 1947 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:43:12.715681 kubelet[1947]: I0510 00:43:12.715493 1947 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 00:43:12.715782 kubelet[1947]: I0510 00:43:12.715687 1947 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:43:12.715782 kubelet[1947]: I0510 00:43:12.715695 1947 container_manager_linux.go:304] "Creating device plugin manager" May 10 00:43:12.715782 kubelet[1947]: I0510 00:43:12.715731 1947 state_mem.go:36] "Initialized new in-memory state store" May 10 00:43:12.715873 kubelet[1947]: I0510 00:43:12.715863 1947 kubelet.go:446] "Attempting to sync node with API server" May 10 00:43:12.715901 kubelet[1947]: I0510 00:43:12.715875 1947 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:43:12.715901 kubelet[1947]: I0510 00:43:12.715891 1947 kubelet.go:352] "Adding apiserver pod source" May 10 00:43:12.715945 kubelet[1947]: I0510 00:43:12.715901 1947 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:43:12.718013 kubelet[1947]: I0510 00:43:12.717991 1947 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:43:12.718690 kubelet[1947]: I0510 00:43:12.718673 1947 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:43:12.719437 kubelet[1947]: I0510 00:43:12.719422 1947 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 10 00:43:12.719677 kubelet[1947]: I0510 00:43:12.719661 1947 server.go:1287] "Started kubelet" May 10 00:43:12.721000 audit[1947]: AVC avc: denied { mac_admin } for pid=1947 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.721000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:43:12.721000 audit[1947]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00092aa80 a1=c0001b9428 a2=c00092aa50 a3=25 items=0 ppid=1 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:12.721000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:43:12.723563 kubelet[1947]: I0510 00:43:12.723483 1947 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:43:12.723815 kubelet[1947]: I0510 00:43:12.723726 1947 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:43:12.723815 kubelet[1947]: I0510 00:43:12.723773 1947 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:43:12.724330 kubelet[1947]: I0510 00:43:12.723435 1947 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:43:12.724809 kubelet[1947]: I0510 00:43:12.724792 1947 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 10 00:43:12.724964 kubelet[1947]: I0510 00:43:12.724947 1947 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:43:12.726324 kubelet[1947]: E0510 00:43:12.726276 1947 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:43:12.726561 kubelet[1947]: I0510 00:43:12.726512 1947 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 00:43:12.724000 audit[1947]: AVC avc: denied { mac_admin } for pid=1947 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.724000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:43:12.724000 audit[1947]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00041f860 a1=c0001b9440 a2=c00092ab10 a3=25 items=0 ppid=1 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:12.724000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:43:12.728859 kubelet[1947]: I0510 00:43:12.728831 1947 server.go:490] "Adding debug handlers to kubelet server" May 10 00:43:12.730186 kubelet[1947]: I0510 00:43:12.730157 1947 volume_manager.go:297] "Starting Kubelet Volume Manager" May 10 00:43:12.730272 kubelet[1947]: I0510 00:43:12.730247 1947 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:43:12.730362 kubelet[1947]: I0510 00:43:12.730342 1947 reconciler.go:26] "Reconciler: start to sync state" May 10 00:43:12.730798 kubelet[1947]: I0510 00:43:12.730769 1947 factory.go:221] Registration of the systemd container factory successfully May 10 00:43:12.730898 kubelet[1947]: I0510 00:43:12.730874 1947 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:43:12.731754 kubelet[1947]: I0510 00:43:12.731735 1947 factory.go:221] Registration of the containerd container factory successfully May 10 00:43:12.740530 kubelet[1947]: I0510 00:43:12.740450 1947 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:43:12.741481 kubelet[1947]: I0510 00:43:12.741455 1947 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:43:12.741539 kubelet[1947]: I0510 00:43:12.741488 1947 status_manager.go:227] "Starting to sync pod status with apiserver" May 10 00:43:12.741539 kubelet[1947]: I0510 00:43:12.741507 1947 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 10 00:43:12.741539 kubelet[1947]: I0510 00:43:12.741514 1947 kubelet.go:2388] "Starting kubelet main sync loop" May 10 00:43:12.741649 kubelet[1947]: E0510 00:43:12.741567 1947 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:43:12.755105 kubelet[1947]: I0510 00:43:12.755085 1947 cpu_manager.go:221] "Starting CPU manager" policy="none" May 10 00:43:12.755279 kubelet[1947]: I0510 00:43:12.755262 1947 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 10 00:43:12.755359 kubelet[1947]: I0510 00:43:12.755346 1947 state_mem.go:36] "Initialized new in-memory state store" May 10 00:43:12.755573 kubelet[1947]: I0510 00:43:12.755534 1947 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 10 00:43:12.755664 kubelet[1947]: I0510 00:43:12.755633 1947 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 10 00:43:12.755742 kubelet[1947]: I0510 00:43:12.755727 1947 policy_none.go:49] "None policy: Start" May 10 00:43:12.755828 kubelet[1947]: I0510 00:43:12.755810 1947 memory_manager.go:186] "Starting memorymanager" policy="None" May 10 00:43:12.755915 kubelet[1947]: I0510 00:43:12.755901 1947 state_mem.go:35] "Initializing new in-memory state store" May 10 00:43:12.756098 kubelet[1947]: I0510 00:43:12.756084 1947 state_mem.go:75] "Updated machine memory state" May 10 00:43:12.759367 kubelet[1947]: I0510 00:43:12.759351 1947 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:43:12.759000 audit[1947]: AVC avc: denied { mac_admin } for pid=1947 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:12.759000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:43:12.759000 audit[1947]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010251a0 a1=c000235710 a2=c001025170 a3=25 items=0 ppid=1 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:12.759000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:43:12.760151 kubelet[1947]: I0510 00:43:12.760131 1947 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:43:12.760348 kubelet[1947]: I0510 00:43:12.760333 1947 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 00:43:12.760440 kubelet[1947]: I0510 00:43:12.760409 1947 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:43:12.760825 kubelet[1947]: I0510 00:43:12.760811 1947 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:43:12.761370 kubelet[1947]: E0510 00:43:12.761351 1947 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 10 00:43:12.842887 kubelet[1947]: I0510 00:43:12.842857 1947 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 10 00:43:12.843022 kubelet[1947]: I0510 00:43:12.842962 1947 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 10 00:43:12.843113 kubelet[1947]: I0510 00:43:12.843082 1947 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 10 00:43:12.848471 kubelet[1947]: E0510 00:43:12.848449 1947 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 10 00:43:12.848620 kubelet[1947]: E0510 00:43:12.848453 1947 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 10 00:43:12.848779 kubelet[1947]: E0510 00:43:12.848743 1947 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 10 00:43:12.864863 kubelet[1947]: I0510 00:43:12.864832 1947 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 10 00:43:12.869921 kubelet[1947]: I0510 00:43:12.869900 1947 kubelet_node_status.go:125] "Node was previously registered" node="localhost" May 10 00:43:12.869996 kubelet[1947]: I0510 00:43:12.869982 1947 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 10 00:43:12.932164 kubelet[1947]: I0510 00:43:12.932089 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/48bc0c31b0630eccea6bdbcb0e9db7bc-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"48bc0c31b0630eccea6bdbcb0e9db7bc\") " pod="kube-system/kube-apiserver-localhost" May 10 00:43:12.932164 kubelet[1947]: I0510 00:43:12.932149 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:43:12.932406 kubelet[1947]: I0510 00:43:12.932184 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 10 00:43:12.932406 kubelet[1947]: I0510 00:43:12.932210 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:43:12.932406 kubelet[1947]: I0510 00:43:12.932229 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/48bc0c31b0630eccea6bdbcb0e9db7bc-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"48bc0c31b0630eccea6bdbcb0e9db7bc\") " pod="kube-system/kube-apiserver-localhost" May 10 00:43:12.932406 kubelet[1947]: I0510 00:43:12.932247 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/48bc0c31b0630eccea6bdbcb0e9db7bc-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"48bc0c31b0630eccea6bdbcb0e9db7bc\") " pod="kube-system/kube-apiserver-localhost" May 10 00:43:12.932406 kubelet[1947]: I0510 00:43:12.932265 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:43:12.932525 kubelet[1947]: I0510 00:43:12.932285 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:43:12.932525 kubelet[1947]: I0510 00:43:12.932320 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 10 00:43:13.149992 kubelet[1947]: E0510 00:43:13.149860 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:13.149992 kubelet[1947]: E0510 00:43:13.149918 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:13.149992 kubelet[1947]: E0510 00:43:13.149932 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:13.250000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:43:13.250000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003a2880 a2=fc6 a3=0 items=0 ppid=1675 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 key=(null) May 10 00:43:13.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:43:13.250000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:43:13.250000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003a2920 a2=fc6 a3=0 items=0 ppid=1675 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 key=(null) May 10 00:43:13.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:43:13.250000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:43:13.250000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003a29a0 a2=fc6 a3=0 items=0 ppid=1675 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 key=(null) May 10 00:43:13.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:43:13.250000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:43:13.250000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d5d900 a2=fc6 a3=0 items=0 ppid=1675 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 key=(null) May 10 00:43:13.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:43:13.717654 kubelet[1947]: I0510 00:43:13.717609 1947 apiserver.go:52] "Watching apiserver" May 10 00:43:13.736785 kubelet[1947]: I0510 00:43:13.736721 1947 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:43:13.749202 kubelet[1947]: I0510 00:43:13.749170 1947 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 10 00:43:13.749495 kubelet[1947]: I0510 00:43:13.749475 1947 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 10 00:43:13.749696 kubelet[1947]: I0510 00:43:13.749677 1947 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 10 00:43:13.758789 kubelet[1947]: E0510 00:43:13.757343 1947 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 10 00:43:13.758789 kubelet[1947]: E0510 00:43:13.757361 1947 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 10 00:43:13.758789 kubelet[1947]: E0510 00:43:13.757566 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:13.758789 kubelet[1947]: E0510 00:43:13.757538 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:13.761106 kubelet[1947]: E0510 00:43:13.761072 1947 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 10 00:43:13.761235 kubelet[1947]: E0510 00:43:13.761212 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:13.783337 kubelet[1947]: I0510 00:43:13.783278 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.783237038 podStartE2EDuration="2.783237038s" podCreationTimestamp="2025-05-10 00:43:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:43:13.783123515 +0000 UTC m=+1.115778973" watchObservedRunningTime="2025-05-10 00:43:13.783237038 +0000 UTC m=+1.115892496" May 10 00:43:13.783564 kubelet[1947]: I0510 00:43:13.783400 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=2.783396016 podStartE2EDuration="2.783396016s" podCreationTimestamp="2025-05-10 00:43:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:43:13.776196732 +0000 UTC m=+1.108852190" watchObservedRunningTime="2025-05-10 00:43:13.783396016 +0000 UTC m=+1.116051474" May 10 00:43:14.750880 kubelet[1947]: E0510 00:43:14.750834 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:14.751617 kubelet[1947]: E0510 00:43:14.751584 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:14.751881 kubelet[1947]: E0510 00:43:14.751856 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:15.753324 kubelet[1947]: E0510 00:43:15.753261 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:16.641000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 00:43:16.643683 kernel: kauditd_printk_skb: 278 callbacks suppressed May 10 00:43:16.643742 kernel: audit: type=1400 audit(1746837796.641:808): avc: denied { watch } for pid=1841 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 00:43:16.641000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d76d80 a2=fc6 a3=0 items=0 ppid=1675 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 key=(null) May 10 00:43:16.654657 kernel: audit: type=1300 audit(1746837796.641:808): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d76d80 a2=fc6 a3=0 items=0 ppid=1675 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 key=(null) May 10 00:43:16.654702 kernel: audit: type=1327 audit(1746837796.641:808): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:43:16.641000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:43:17.307216 sudo[1341]: pam_unix(sudo:session): session closed for user root May 10 00:43:17.306000 audit[1341]: USER_END pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:17.308910 sshd[1338]: pam_unix(sshd:session): session closed for user core May 10 00:43:17.311157 systemd[1]: sshd@6-10.0.0.88:22-10.0.0.1:60032.service: Deactivated successfully. May 10 00:43:17.312019 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:43:17.312163 systemd[1]: session-7.scope: Consumed 4.409s CPU time. May 10 00:43:17.306000 audit[1341]: CRED_DISP pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:17.312788 systemd-logind[1191]: Session 7 logged out. Waiting for processes to exit. May 10 00:43:17.313453 systemd-logind[1191]: Removed session 7. May 10 00:43:17.316742 kernel: audit: type=1106 audit(1746837797.306:809): pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:17.316814 kernel: audit: type=1104 audit(1746837797.306:810): pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:43:17.316850 kernel: audit: type=1106 audit(1746837797.309:811): pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:17.309000 audit[1338]: USER_END pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:17.309000 audit[1338]: CRED_DISP pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:17.326443 kernel: audit: type=1104 audit(1746837797.309:812): pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:17.326489 kernel: audit: type=1131 audit(1746837797.310:813): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.88:22-10.0.0.1:60032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:17.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.88:22-10.0.0.1:60032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:17.778986 kubelet[1947]: I0510 00:43:17.778922 1947 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 10 00:43:17.780496 env[1202]: time="2025-05-10T00:43:17.780354896Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 00:43:17.780952 kubelet[1947]: I0510 00:43:17.780925 1947 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 10 00:43:18.802510 kubelet[1947]: I0510 00:43:18.802346 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=7.802321938 podStartE2EDuration="7.802321938s" podCreationTimestamp="2025-05-10 00:43:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:43:13.791035145 +0000 UTC m=+1.123690603" watchObservedRunningTime="2025-05-10 00:43:18.802321938 +0000 UTC m=+6.134977396" May 10 00:43:18.808500 systemd[1]: Created slice kubepods-besteffort-pod61f431d1_a08f_4fe9_9132_51d13535bf18.slice. May 10 00:43:18.971747 systemd[1]: Created slice kubepods-besteffort-pod6420b581_7a27_4814_a0da_e72c747fb331.slice. May 10 00:43:18.973327 kubelet[1947]: I0510 00:43:18.973281 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/61f431d1-a08f-4fe9-9132-51d13535bf18-kube-proxy\") pod \"kube-proxy-b5b4h\" (UID: \"61f431d1-a08f-4fe9-9132-51d13535bf18\") " pod="kube-system/kube-proxy-b5b4h" May 10 00:43:18.973327 kubelet[1947]: I0510 00:43:18.973324 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/61f431d1-a08f-4fe9-9132-51d13535bf18-xtables-lock\") pod \"kube-proxy-b5b4h\" (UID: \"61f431d1-a08f-4fe9-9132-51d13535bf18\") " pod="kube-system/kube-proxy-b5b4h" May 10 00:43:18.973464 kubelet[1947]: I0510 00:43:18.973377 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/61f431d1-a08f-4fe9-9132-51d13535bf18-lib-modules\") pod \"kube-proxy-b5b4h\" (UID: \"61f431d1-a08f-4fe9-9132-51d13535bf18\") " pod="kube-system/kube-proxy-b5b4h" May 10 00:43:18.973464 kubelet[1947]: I0510 00:43:18.973397 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f7jbp\" (UniqueName: \"kubernetes.io/projected/61f431d1-a08f-4fe9-9132-51d13535bf18-kube-api-access-f7jbp\") pod \"kube-proxy-b5b4h\" (UID: \"61f431d1-a08f-4fe9-9132-51d13535bf18\") " pod="kube-system/kube-proxy-b5b4h" May 10 00:43:19.073963 kubelet[1947]: I0510 00:43:19.073806 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5knhk\" (UniqueName: \"kubernetes.io/projected/6420b581-7a27-4814-a0da-e72c747fb331-kube-api-access-5knhk\") pod \"tigera-operator-789496d6f5-hczt9\" (UID: \"6420b581-7a27-4814-a0da-e72c747fb331\") " pod="tigera-operator/tigera-operator-789496d6f5-hczt9" May 10 00:43:19.073963 kubelet[1947]: I0510 00:43:19.073884 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6420b581-7a27-4814-a0da-e72c747fb331-var-lib-calico\") pod \"tigera-operator-789496d6f5-hczt9\" (UID: \"6420b581-7a27-4814-a0da-e72c747fb331\") " pod="tigera-operator/tigera-operator-789496d6f5-hczt9" May 10 00:43:19.079490 kubelet[1947]: I0510 00:43:19.079454 1947 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 10 00:43:19.117751 kubelet[1947]: E0510 00:43:19.117718 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:19.118352 env[1202]: time="2025-05-10T00:43:19.118299388Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-b5b4h,Uid:61f431d1-a08f-4fe9-9132-51d13535bf18,Namespace:kube-system,Attempt:0,}" May 10 00:43:19.137064 env[1202]: time="2025-05-10T00:43:19.136973419Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:43:19.137064 env[1202]: time="2025-05-10T00:43:19.137009197Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:43:19.137064 env[1202]: time="2025-05-10T00:43:19.137018896Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:43:19.137285 env[1202]: time="2025-05-10T00:43:19.137183900Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a3eba5c69a7b0a328c3f3b426c711b1ffe82222cd1ad36082b808aae8130531c pid=2042 runtime=io.containerd.runc.v2 May 10 00:43:19.150397 systemd[1]: Started cri-containerd-a3eba5c69a7b0a328c3f3b426c711b1ffe82222cd1ad36082b808aae8130531c.scope. May 10 00:43:19.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.171738 kernel: audit: type=1400 audit(1746837799.161:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.171883 kernel: audit: type=1400 audit(1746837799.161:815): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit: BPF prog-id=100 op=LOAD May 10 00:43:19.162000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2042 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656261356336396137623061333238633366336234323663373131 May 10 00:43:19.162000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2042 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656261356336396137623061333238633366336234323663373131 May 10 00:43:19.162000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.162000 audit: BPF prog-id=101 op=LOAD May 10 00:43:19.162000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000bc830 items=0 ppid=2042 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656261356336396137623061333238633366336234323663373131 May 10 00:43:19.167000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.167000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.167000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.167000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.167000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.167000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.167000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.167000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.167000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.167000 audit: BPF prog-id=102 op=LOAD May 10 00:43:19.167000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000bc878 items=0 ppid=2042 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656261356336396137623061333238633366336234323663373131 May 10 00:43:19.171000 audit: BPF prog-id=102 op=UNLOAD May 10 00:43:19.171000 audit: BPF prog-id=101 op=UNLOAD May 10 00:43:19.171000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.171000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.171000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.171000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.171000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.171000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.171000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.171000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.171000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.171000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.171000 audit: BPF prog-id=103 op=LOAD May 10 00:43:19.171000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000bcc88 items=0 ppid=2042 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656261356336396137623061333238633366336234323663373131 May 10 00:43:19.186578 env[1202]: time="2025-05-10T00:43:19.186511103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-b5b4h,Uid:61f431d1-a08f-4fe9-9132-51d13535bf18,Namespace:kube-system,Attempt:0,} returns sandbox id \"a3eba5c69a7b0a328c3f3b426c711b1ffe82222cd1ad36082b808aae8130531c\"" May 10 00:43:19.187629 kubelet[1947]: E0510 00:43:19.187606 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:19.196181 env[1202]: time="2025-05-10T00:43:19.192621118Z" level=info msg="CreateContainer within sandbox \"a3eba5c69a7b0a328c3f3b426c711b1ffe82222cd1ad36082b808aae8130531c\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 00:43:19.213135 env[1202]: time="2025-05-10T00:43:19.213079306Z" level=info msg="CreateContainer within sandbox \"a3eba5c69a7b0a328c3f3b426c711b1ffe82222cd1ad36082b808aae8130531c\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"bd3491129a8c235d7178f57e31bad63c57dbe98c6ed4cf5bede058230f1b131e\"" May 10 00:43:19.214457 env[1202]: time="2025-05-10T00:43:19.213693479Z" level=info msg="StartContainer for \"bd3491129a8c235d7178f57e31bad63c57dbe98c6ed4cf5bede058230f1b131e\"" May 10 00:43:19.227749 systemd[1]: Started cri-containerd-bd3491129a8c235d7178f57e31bad63c57dbe98c6ed4cf5bede058230f1b131e.scope. May 10 00:43:19.240000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f3a4d411c88 items=0 ppid=2042 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264333439313132396138633233356437313738663537653331626164 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit: BPF prog-id=104 op=LOAD May 10 00:43:19.240000 audit[2084]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003de248 items=0 ppid=2042 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264333439313132396138633233356437313738663537653331626164 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit: BPF prog-id=105 op=LOAD May 10 00:43:19.240000 audit[2084]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003de298 items=0 ppid=2042 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264333439313132396138633233356437313738663537653331626164 May 10 00:43:19.240000 audit: BPF prog-id=105 op=UNLOAD May 10 00:43:19.240000 audit: BPF prog-id=104 op=UNLOAD May 10 00:43:19.240000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.240000 audit: BPF prog-id=106 op=LOAD May 10 00:43:19.240000 audit[2084]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003de328 items=0 ppid=2042 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264333439313132396138633233356437313738663537653331626164 May 10 00:43:19.255606 env[1202]: time="2025-05-10T00:43:19.253621156Z" level=info msg="StartContainer for \"bd3491129a8c235d7178f57e31bad63c57dbe98c6ed4cf5bede058230f1b131e\" returns successfully" May 10 00:43:19.274700 env[1202]: time="2025-05-10T00:43:19.274636568Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-hczt9,Uid:6420b581-7a27-4814-a0da-e72c747fb331,Namespace:tigera-operator,Attempt:0,}" May 10 00:43:19.289793 env[1202]: time="2025-05-10T00:43:19.289708122Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:43:19.289793 env[1202]: time="2025-05-10T00:43:19.289749751Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:43:19.289793 env[1202]: time="2025-05-10T00:43:19.289771993Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:43:19.290089 env[1202]: time="2025-05-10T00:43:19.290046477Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5189c46fd1387459e7811cb4b4d9022636f18066631fc5a093e2974d46d8ce28 pid=2123 runtime=io.containerd.runc.v2 May 10 00:43:19.302925 systemd[1]: Started cri-containerd-5189c46fd1387459e7811cb4b4d9022636f18066631fc5a093e2974d46d8ce28.scope. May 10 00:43:19.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.318000 audit: BPF prog-id=107 op=LOAD May 10 00:43:19.319000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2123 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531383963343666643133383734353965373831316362346234643930 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2123 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531383963343666643133383734353965373831316362346234643930 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit: BPF prog-id=108 op=LOAD May 10 00:43:19.319000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003a31c0 items=0 ppid=2123 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531383963343666643133383734353965373831316362346234643930 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.319000 audit: BPF prog-id=109 op=LOAD May 10 00:43:19.319000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003a3208 items=0 ppid=2123 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531383963343666643133383734353965373831316362346234643930 May 10 00:43:19.320000 audit: BPF prog-id=109 op=UNLOAD May 10 00:43:19.320000 audit: BPF prog-id=108 op=UNLOAD May 10 00:43:19.320000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.320000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.320000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.320000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.320000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.320000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.320000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.320000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.320000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.320000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:19.320000 audit: BPF prog-id=110 op=LOAD May 10 00:43:19.320000 audit[2132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003a3618 items=0 ppid=2123 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531383963343666643133383734353965373831316362346234643930 May 10 00:43:19.348368 env[1202]: time="2025-05-10T00:43:19.348316473Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-hczt9,Uid:6420b581-7a27-4814-a0da-e72c747fb331,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"5189c46fd1387459e7811cb4b4d9022636f18066631fc5a093e2974d46d8ce28\"" May 10 00:43:19.350320 env[1202]: time="2025-05-10T00:43:19.350289620Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 10 00:43:19.397000 audit[2185]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.397000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8b53cb10 a2=0 a3=7fff8b53cafc items=0 ppid=2096 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.397000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:43:19.398000 audit[2186]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.398000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe68221fc0 a2=0 a3=7ffe68221fac items=0 ppid=2096 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:43:19.399000 audit[2187]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.399000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd8bee950 a2=0 a3=7ffdd8bee93c items=0 ppid=2096 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.399000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:43:19.399000 audit[2189]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.399000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe00864e0 a2=0 a3=7fffe00864cc items=0 ppid=2096 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.399000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:43:19.400000 audit[2191]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.400000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc41d19dd0 a2=0 a3=7ffc41d19dbc items=0 ppid=2096 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.400000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:43:19.400000 audit[2192]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.400000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff73ae6b30 a2=0 a3=7fff73ae6b1c items=0 ppid=2096 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.400000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:43:19.499000 audit[2193]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.499000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff380f5ac0 a2=0 a3=7fff380f5aac items=0 ppid=2096 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.499000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:43:19.502000 audit[2195]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.502000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe0556a1d0 a2=0 a3=7ffe0556a1bc items=0 ppid=2096 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.502000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 00:43:19.506000 audit[2198]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.506000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe52df37a0 a2=0 a3=7ffe52df378c items=0 ppid=2096 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.506000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 00:43:19.507000 audit[2199]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.507000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff28bf7510 a2=0 a3=7fff28bf74fc items=0 ppid=2096 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.507000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:43:19.509000 audit[2201]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.509000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd9d6ed3a0 a2=0 a3=7ffd9d6ed38c items=0 ppid=2096 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.509000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:43:19.510000 audit[2202]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.510000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfe94ac40 a2=0 a3=7ffdfe94ac2c items=0 ppid=2096 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.510000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:43:19.512000 audit[2204]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.512000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd71263b90 a2=0 a3=7ffd71263b7c items=0 ppid=2096 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.512000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:43:19.515000 audit[2207]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.515000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffe2391e20 a2=0 a3=7fffe2391e0c items=0 ppid=2096 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.515000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 00:43:19.516000 audit[2208]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.516000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6d46df00 a2=0 a3=7ffc6d46deec items=0 ppid=2096 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.516000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:43:19.519000 audit[2210]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.519000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd52078e80 a2=0 a3=7ffd52078e6c items=0 ppid=2096 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.519000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:43:19.520000 audit[2211]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.520000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda4aaf680 a2=0 a3=7ffda4aaf66c items=0 ppid=2096 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.520000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:43:19.523000 audit[2213]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.523000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd33fa1de0 a2=0 a3=7ffd33fa1dcc items=0 ppid=2096 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.523000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:43:19.526000 audit[2216]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.526000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe787f2aa0 a2=0 a3=7ffe787f2a8c items=0 ppid=2096 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.526000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:43:19.531000 audit[2219]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.531000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca03812f0 a2=0 a3=7ffca03812dc items=0 ppid=2096 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.531000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:43:19.532000 audit[2220]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.532000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe2992b010 a2=0 a3=7ffe2992affc items=0 ppid=2096 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.532000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:43:19.534000 audit[2222]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.534000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffad932470 a2=0 a3=7fffad93245c items=0 ppid=2096 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.534000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:43:19.537000 audit[2225]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.537000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffe19c37a0 a2=0 a3=7fffe19c378c items=0 ppid=2096 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:43:19.538000 audit[2226]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.538000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde0c7ee70 a2=0 a3=7ffde0c7ee5c items=0 ppid=2096 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.538000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:43:19.541000 audit[2228]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:43:19.541000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff2bb43d70 a2=0 a3=7fff2bb43d5c items=0 ppid=2096 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.541000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:43:19.564000 audit[2234]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:19.564000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd8b7fbff0 a2=0 a3=7ffd8b7fbfdc items=0 ppid=2096 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.564000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:19.573000 audit[2234]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:19.573000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd8b7fbff0 a2=0 a3=7ffd8b7fbfdc items=0 ppid=2096 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.573000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:19.574000 audit[2239]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.574000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd753125e0 a2=0 a3=7ffd753125cc items=0 ppid=2096 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:43:19.577000 audit[2241]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.577000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffce89e26f0 a2=0 a3=7ffce89e26dc items=0 ppid=2096 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 00:43:19.581000 audit[2244]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.581000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd163d3a40 a2=0 a3=7ffd163d3a2c items=0 ppid=2096 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.581000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 00:43:19.582000 audit[2245]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.582000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffaa92370 a2=0 a3=7ffffaa9235c items=0 ppid=2096 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.582000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:43:19.584000 audit[2247]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.584000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe76050b50 a2=0 a3=7ffe76050b3c items=0 ppid=2096 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.584000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:43:19.585000 audit[2248]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.585000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5a8c0d30 a2=0 a3=7fff5a8c0d1c items=0 ppid=2096 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.585000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:43:19.588000 audit[2250]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.588000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffbee7c3b0 a2=0 a3=7fffbee7c39c items=0 ppid=2096 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.588000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 00:43:19.592000 audit[2253]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.592000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe0a7e3690 a2=0 a3=7ffe0a7e367c items=0 ppid=2096 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.592000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:43:19.593000 audit[2254]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.593000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbc13a9a0 a2=0 a3=7ffcbc13a98c items=0 ppid=2096 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.593000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:43:19.596000 audit[2256]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.596000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe2181cb90 a2=0 a3=7ffe2181cb7c items=0 ppid=2096 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.596000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:43:19.597000 audit[2257]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.597000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed0726340 a2=0 a3=7ffed072632c items=0 ppid=2096 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.597000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:43:19.600000 audit[2259]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.600000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed24d4610 a2=0 a3=7ffed24d45fc items=0 ppid=2096 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.600000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:43:19.604000 audit[2262]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.604000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc40ca57b0 a2=0 a3=7ffc40ca579c items=0 ppid=2096 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.604000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:43:19.608000 audit[2265]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.608000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdcb0f3d60 a2=0 a3=7ffdcb0f3d4c items=0 ppid=2096 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.608000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 00:43:19.609000 audit[2266]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.609000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd3adc33d0 a2=0 a3=7ffd3adc33bc items=0 ppid=2096 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.609000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:43:19.611000 audit[2268]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.611000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd5d4d9aa0 a2=0 a3=7ffd5d4d9a8c items=0 ppid=2096 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.611000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:43:19.615000 audit[2271]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.615000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc3c7f1940 a2=0 a3=7ffc3c7f192c items=0 ppid=2096 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.615000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:43:19.616000 audit[2272]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.616000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7ab305a0 a2=0 a3=7ffd7ab3058c items=0 ppid=2096 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.616000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:43:19.619000 audit[2274]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.619000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd045dc4c0 a2=0 a3=7ffd045dc4ac items=0 ppid=2096 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.619000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:43:19.620000 audit[2275]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.620000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff05de42c0 a2=0 a3=7fff05de42ac items=0 ppid=2096 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.620000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:43:19.622000 audit[2277]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.622000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd9e42ed50 a2=0 a3=7ffd9e42ed3c items=0 ppid=2096 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.622000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:43:19.625000 audit[2280]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:43:19.625000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff76d28630 a2=0 a3=7fff76d2861c items=0 ppid=2096 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.625000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:43:19.628000 audit[2282]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:43:19.628000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fffa9fc5210 a2=0 a3=7fffa9fc51fc items=0 ppid=2096 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.628000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:19.628000 audit[2282]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:43:19.628000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffa9fc5210 a2=0 a3=7fffa9fc51fc items=0 ppid=2096 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:19.628000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:19.654134 kubelet[1947]: E0510 00:43:19.654092 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:19.765718 kubelet[1947]: E0510 00:43:19.765679 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:19.766350 kubelet[1947]: E0510 00:43:19.766205 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:19.776074 kubelet[1947]: I0510 00:43:19.776004 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-b5b4h" podStartSLOduration=1.7759812080000001 podStartE2EDuration="1.775981208s" podCreationTimestamp="2025-05-10 00:43:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:43:19.77544762 +0000 UTC m=+7.108103108" watchObservedRunningTime="2025-05-10 00:43:19.775981208 +0000 UTC m=+7.108636666" May 10 00:43:20.768387 kubelet[1947]: E0510 00:43:20.768350 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:21.147608 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount56695729.mount: Deactivated successfully. May 10 00:43:22.003119 env[1202]: time="2025-05-10T00:43:22.003039747Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:22.005328 env[1202]: time="2025-05-10T00:43:22.005271696Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:22.006846 env[1202]: time="2025-05-10T00:43:22.006815824Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:22.008429 env[1202]: time="2025-05-10T00:43:22.008380903Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:22.008972 env[1202]: time="2025-05-10T00:43:22.008936420Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 10 00:43:22.011850 env[1202]: time="2025-05-10T00:43:22.011800962Z" level=info msg="CreateContainer within sandbox \"5189c46fd1387459e7811cb4b4d9022636f18066631fc5a093e2974d46d8ce28\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 10 00:43:22.025599 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1741921416.mount: Deactivated successfully. May 10 00:43:22.027650 env[1202]: time="2025-05-10T00:43:22.027607867Z" level=info msg="CreateContainer within sandbox \"5189c46fd1387459e7811cb4b4d9022636f18066631fc5a093e2974d46d8ce28\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"647b213ecdfe1042679ef8cb177c107d37c14566419065017b6c1bf8bed1f831\"" May 10 00:43:22.028177 env[1202]: time="2025-05-10T00:43:22.028137144Z" level=info msg="StartContainer for \"647b213ecdfe1042679ef8cb177c107d37c14566419065017b6c1bf8bed1f831\"" May 10 00:43:22.043835 systemd[1]: Started cri-containerd-647b213ecdfe1042679ef8cb177c107d37c14566419065017b6c1bf8bed1f831.scope. May 10 00:43:22.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.087422 kernel: kauditd_printk_skb: 308 callbacks suppressed May 10 00:43:22.087494 kernel: audit: type=1400 audit(1746837802.085:907): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.094530 kernel: audit: type=1400 audit(1746837802.085:908): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.094653 kernel: audit: type=1400 audit(1746837802.085:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.100931 kernel: audit: type=1400 audit(1746837802.085:910): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.101164 kernel: audit: type=1400 audit(1746837802.085:911): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.107745 kernel: audit: type=1400 audit(1746837802.085:912): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.107804 kernel: audit: type=1400 audit(1746837802.085:913): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.114392 kernel: audit: type=1400 audit(1746837802.085:914): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.114464 kernel: audit: type=1400 audit(1746837802.085:915): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.120391 kernel: audit: type=1400 audit(1746837802.086:916): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.086000 audit: BPF prog-id=111 op=LOAD May 10 00:43:22.087000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.087000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2123 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:22.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634376232313365636466653130343236373965663863623137376331 May 10 00:43:22.087000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.087000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2123 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:22.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634376232313365636466653130343236373965663863623137376331 May 10 00:43:22.087000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.087000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.087000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.087000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.087000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.087000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.087000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.087000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.087000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.087000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.087000 audit: BPF prog-id=112 op=LOAD May 10 00:43:22.087000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000184e60 items=0 ppid=2123 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:22.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634376232313365636466653130343236373965663863623137376331 May 10 00:43:22.094000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.094000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.094000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.094000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.094000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.094000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.094000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.094000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.094000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.094000 audit: BPF prog-id=113 op=LOAD May 10 00:43:22.094000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000184ea8 items=0 ppid=2123 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:22.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634376232313365636466653130343236373965663863623137376331 May 10 00:43:22.097000 audit: BPF prog-id=113 op=UNLOAD May 10 00:43:22.097000 audit: BPF prog-id=112 op=UNLOAD May 10 00:43:22.097000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.097000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.097000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.097000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.097000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.097000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.097000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.097000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.097000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.097000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:22.097000 audit: BPF prog-id=114 op=LOAD May 10 00:43:22.097000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001852b8 items=0 ppid=2123 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:22.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634376232313365636466653130343236373965663863623137376331 May 10 00:43:22.242902 env[1202]: time="2025-05-10T00:43:22.242812628Z" level=info msg="StartContainer for \"647b213ecdfe1042679ef8cb177c107d37c14566419065017b6c1bf8bed1f831\" returns successfully" May 10 00:43:22.787032 kubelet[1947]: I0510 00:43:22.786425 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-789496d6f5-hczt9" podStartSLOduration=2.126461246 podStartE2EDuration="4.786396039s" podCreationTimestamp="2025-05-10 00:43:18 +0000 UTC" firstStartedPulling="2025-05-10 00:43:19.349854841 +0000 UTC m=+6.682510299" lastFinishedPulling="2025-05-10 00:43:22.009789634 +0000 UTC m=+9.342445092" observedRunningTime="2025-05-10 00:43:22.786305827 +0000 UTC m=+10.118961285" watchObservedRunningTime="2025-05-10 00:43:22.786396039 +0000 UTC m=+10.119051497" May 10 00:43:23.184040 kubelet[1947]: E0510 00:43:23.183976 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:23.598311 kubelet[1947]: E0510 00:43:23.598240 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:23.775212 kubelet[1947]: E0510 00:43:23.775160 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:24.855000 audit[2325]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:24.855000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdd660e9e0 a2=0 a3=7ffdd660e9cc items=0 ppid=2096 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:24.855000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:24.862000 audit[2325]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:24.862000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdd660e9e0 a2=0 a3=0 items=0 ppid=2096 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:24.862000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:24.875000 audit[2327]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:24.875000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe8d08b490 a2=0 a3=7ffe8d08b47c items=0 ppid=2096 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:24.875000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:24.880000 audit[2327]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:24.880000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe8d08b490 a2=0 a3=0 items=0 ppid=2096 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:24.880000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:25.053747 systemd[1]: Created slice kubepods-besteffort-pod905aef5e_7a16_45bb_962c_c2edcfd63c55.slice. May 10 00:43:25.114783 kubelet[1947]: I0510 00:43:25.114630 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z5jhp\" (UniqueName: \"kubernetes.io/projected/905aef5e-7a16-45bb-962c-c2edcfd63c55-kube-api-access-z5jhp\") pod \"calico-typha-64fb8c8bf4-5kdh4\" (UID: \"905aef5e-7a16-45bb-962c-c2edcfd63c55\") " pod="calico-system/calico-typha-64fb8c8bf4-5kdh4" May 10 00:43:25.114783 kubelet[1947]: I0510 00:43:25.114696 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/905aef5e-7a16-45bb-962c-c2edcfd63c55-tigera-ca-bundle\") pod \"calico-typha-64fb8c8bf4-5kdh4\" (UID: \"905aef5e-7a16-45bb-962c-c2edcfd63c55\") " pod="calico-system/calico-typha-64fb8c8bf4-5kdh4" May 10 00:43:25.114783 kubelet[1947]: I0510 00:43:25.114726 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/905aef5e-7a16-45bb-962c-c2edcfd63c55-typha-certs\") pod \"calico-typha-64fb8c8bf4-5kdh4\" (UID: \"905aef5e-7a16-45bb-962c-c2edcfd63c55\") " pod="calico-system/calico-typha-64fb8c8bf4-5kdh4" May 10 00:43:25.152987 systemd[1]: Created slice kubepods-besteffort-podb401bee4_6367_40b6_9f82_ae8968e3ec29.slice. May 10 00:43:25.215591 kubelet[1947]: I0510 00:43:25.215515 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b401bee4-6367-40b6-9f82-ae8968e3ec29-node-certs\") pod \"calico-node-nnvm8\" (UID: \"b401bee4-6367-40b6-9f82-ae8968e3ec29\") " pod="calico-system/calico-node-nnvm8" May 10 00:43:25.215819 kubelet[1947]: I0510 00:43:25.215599 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b401bee4-6367-40b6-9f82-ae8968e3ec29-var-lib-calico\") pod \"calico-node-nnvm8\" (UID: \"b401bee4-6367-40b6-9f82-ae8968e3ec29\") " pod="calico-system/calico-node-nnvm8" May 10 00:43:25.215819 kubelet[1947]: I0510 00:43:25.215639 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b401bee4-6367-40b6-9f82-ae8968e3ec29-cni-net-dir\") pod \"calico-node-nnvm8\" (UID: \"b401bee4-6367-40b6-9f82-ae8968e3ec29\") " pod="calico-system/calico-node-nnvm8" May 10 00:43:25.215819 kubelet[1947]: I0510 00:43:25.215702 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b401bee4-6367-40b6-9f82-ae8968e3ec29-flexvol-driver-host\") pod \"calico-node-nnvm8\" (UID: \"b401bee4-6367-40b6-9f82-ae8968e3ec29\") " pod="calico-system/calico-node-nnvm8" May 10 00:43:25.215819 kubelet[1947]: I0510 00:43:25.215739 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rk55w\" (UniqueName: \"kubernetes.io/projected/b401bee4-6367-40b6-9f82-ae8968e3ec29-kube-api-access-rk55w\") pod \"calico-node-nnvm8\" (UID: \"b401bee4-6367-40b6-9f82-ae8968e3ec29\") " pod="calico-system/calico-node-nnvm8" May 10 00:43:25.215819 kubelet[1947]: I0510 00:43:25.215772 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b401bee4-6367-40b6-9f82-ae8968e3ec29-lib-modules\") pod \"calico-node-nnvm8\" (UID: \"b401bee4-6367-40b6-9f82-ae8968e3ec29\") " pod="calico-system/calico-node-nnvm8" May 10 00:43:25.216024 kubelet[1947]: I0510 00:43:25.215793 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b401bee4-6367-40b6-9f82-ae8968e3ec29-policysync\") pod \"calico-node-nnvm8\" (UID: \"b401bee4-6367-40b6-9f82-ae8968e3ec29\") " pod="calico-system/calico-node-nnvm8" May 10 00:43:25.216024 kubelet[1947]: I0510 00:43:25.215812 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b401bee4-6367-40b6-9f82-ae8968e3ec29-cni-bin-dir\") pod \"calico-node-nnvm8\" (UID: \"b401bee4-6367-40b6-9f82-ae8968e3ec29\") " pod="calico-system/calico-node-nnvm8" May 10 00:43:25.216024 kubelet[1947]: I0510 00:43:25.215840 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b401bee4-6367-40b6-9f82-ae8968e3ec29-xtables-lock\") pod \"calico-node-nnvm8\" (UID: \"b401bee4-6367-40b6-9f82-ae8968e3ec29\") " pod="calico-system/calico-node-nnvm8" May 10 00:43:25.216024 kubelet[1947]: I0510 00:43:25.215867 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b401bee4-6367-40b6-9f82-ae8968e3ec29-var-run-calico\") pod \"calico-node-nnvm8\" (UID: \"b401bee4-6367-40b6-9f82-ae8968e3ec29\") " pod="calico-system/calico-node-nnvm8" May 10 00:43:25.216024 kubelet[1947]: I0510 00:43:25.215897 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b401bee4-6367-40b6-9f82-ae8968e3ec29-cni-log-dir\") pod \"calico-node-nnvm8\" (UID: \"b401bee4-6367-40b6-9f82-ae8968e3ec29\") " pod="calico-system/calico-node-nnvm8" May 10 00:43:25.216209 kubelet[1947]: I0510 00:43:25.215944 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b401bee4-6367-40b6-9f82-ae8968e3ec29-tigera-ca-bundle\") pod \"calico-node-nnvm8\" (UID: \"b401bee4-6367-40b6-9f82-ae8968e3ec29\") " pod="calico-system/calico-node-nnvm8" May 10 00:43:25.266804 kubelet[1947]: E0510 00:43:25.266739 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kzprd" podUID="b7f06332-7253-4fd1-8fe2-c3b993295a9a" May 10 00:43:25.316946 kubelet[1947]: I0510 00:43:25.316875 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vbz9z\" (UniqueName: \"kubernetes.io/projected/b7f06332-7253-4fd1-8fe2-c3b993295a9a-kube-api-access-vbz9z\") pod \"csi-node-driver-kzprd\" (UID: \"b7f06332-7253-4fd1-8fe2-c3b993295a9a\") " pod="calico-system/csi-node-driver-kzprd" May 10 00:43:25.316946 kubelet[1947]: I0510 00:43:25.316952 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b7f06332-7253-4fd1-8fe2-c3b993295a9a-kubelet-dir\") pod \"csi-node-driver-kzprd\" (UID: \"b7f06332-7253-4fd1-8fe2-c3b993295a9a\") " pod="calico-system/csi-node-driver-kzprd" May 10 00:43:25.317220 kubelet[1947]: I0510 00:43:25.316983 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b7f06332-7253-4fd1-8fe2-c3b993295a9a-varrun\") pod \"csi-node-driver-kzprd\" (UID: \"b7f06332-7253-4fd1-8fe2-c3b993295a9a\") " pod="calico-system/csi-node-driver-kzprd" May 10 00:43:25.317220 kubelet[1947]: I0510 00:43:25.317002 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b7f06332-7253-4fd1-8fe2-c3b993295a9a-socket-dir\") pod \"csi-node-driver-kzprd\" (UID: \"b7f06332-7253-4fd1-8fe2-c3b993295a9a\") " pod="calico-system/csi-node-driver-kzprd" May 10 00:43:25.317220 kubelet[1947]: I0510 00:43:25.317025 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b7f06332-7253-4fd1-8fe2-c3b993295a9a-registration-dir\") pod \"csi-node-driver-kzprd\" (UID: \"b7f06332-7253-4fd1-8fe2-c3b993295a9a\") " pod="calico-system/csi-node-driver-kzprd" May 10 00:43:25.318669 kubelet[1947]: E0510 00:43:25.318642 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.318808 kubelet[1947]: W0510 00:43:25.318778 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.318960 kubelet[1947]: E0510 00:43:25.318935 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.322979 kubelet[1947]: E0510 00:43:25.322959 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.323118 kubelet[1947]: W0510 00:43:25.323093 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.323232 kubelet[1947]: E0510 00:43:25.323210 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.330503 kubelet[1947]: E0510 00:43:25.330477 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.330690 kubelet[1947]: W0510 00:43:25.330664 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.330818 kubelet[1947]: E0510 00:43:25.330795 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.358354 kubelet[1947]: E0510 00:43:25.358288 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:25.358876 env[1202]: time="2025-05-10T00:43:25.358829967Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-64fb8c8bf4-5kdh4,Uid:905aef5e-7a16-45bb-962c-c2edcfd63c55,Namespace:calico-system,Attempt:0,}" May 10 00:43:25.410119 env[1202]: time="2025-05-10T00:43:25.409983657Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:43:25.410119 env[1202]: time="2025-05-10T00:43:25.410033211Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:43:25.410119 env[1202]: time="2025-05-10T00:43:25.410043672Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:43:25.410284 env[1202]: time="2025-05-10T00:43:25.410202843Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/521ccea053ccf7bb5ffb2e4e9795585e467a7241c2fc11a614dff269a577fd86 pid=2341 runtime=io.containerd.runc.v2 May 10 00:43:25.418494 kubelet[1947]: E0510 00:43:25.418453 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.418494 kubelet[1947]: W0510 00:43:25.418485 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.418633 kubelet[1947]: E0510 00:43:25.418512 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.418764 kubelet[1947]: E0510 00:43:25.418738 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.418764 kubelet[1947]: W0510 00:43:25.418755 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.418839 kubelet[1947]: E0510 00:43:25.418766 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.419188 kubelet[1947]: E0510 00:43:25.419013 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.419188 kubelet[1947]: W0510 00:43:25.419030 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.419188 kubelet[1947]: E0510 00:43:25.419042 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.419416 kubelet[1947]: E0510 00:43:25.419269 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.419416 kubelet[1947]: W0510 00:43:25.419280 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.419416 kubelet[1947]: E0510 00:43:25.419292 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.419626 kubelet[1947]: E0510 00:43:25.419586 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.419674 kubelet[1947]: W0510 00:43:25.419622 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.419674 kubelet[1947]: E0510 00:43:25.419665 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.419967 kubelet[1947]: E0510 00:43:25.419932 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.419967 kubelet[1947]: W0510 00:43:25.419962 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.420051 kubelet[1947]: E0510 00:43:25.419979 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.420214 kubelet[1947]: E0510 00:43:25.420190 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.420266 kubelet[1947]: W0510 00:43:25.420208 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.420266 kubelet[1947]: E0510 00:43:25.420234 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.420442 kubelet[1947]: E0510 00:43:25.420418 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.420442 kubelet[1947]: W0510 00:43:25.420435 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.420510 kubelet[1947]: E0510 00:43:25.420447 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.420840 kubelet[1947]: E0510 00:43:25.420817 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.420840 kubelet[1947]: W0510 00:43:25.420834 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.420935 kubelet[1947]: E0510 00:43:25.420862 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.421085 kubelet[1947]: E0510 00:43:25.421024 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.421085 kubelet[1947]: W0510 00:43:25.421040 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.421085 kubelet[1947]: E0510 00:43:25.421073 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.421239 kubelet[1947]: E0510 00:43:25.421215 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.421239 kubelet[1947]: W0510 00:43:25.421232 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.421312 kubelet[1947]: E0510 00:43:25.421256 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.421431 kubelet[1947]: E0510 00:43:25.421406 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.421431 kubelet[1947]: W0510 00:43:25.421425 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.421503 kubelet[1947]: E0510 00:43:25.421449 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.421643 kubelet[1947]: E0510 00:43:25.421617 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.421643 kubelet[1947]: W0510 00:43:25.421635 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.421721 kubelet[1947]: E0510 00:43:25.421667 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.421916 kubelet[1947]: E0510 00:43:25.421833 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.421916 kubelet[1947]: W0510 00:43:25.421847 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.421916 kubelet[1947]: E0510 00:43:25.421866 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.422671 kubelet[1947]: E0510 00:43:25.422180 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.422671 kubelet[1947]: W0510 00:43:25.422195 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.422671 kubelet[1947]: E0510 00:43:25.422212 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.423794 kubelet[1947]: E0510 00:43:25.423759 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.423794 kubelet[1947]: W0510 00:43:25.423787 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.423874 kubelet[1947]: E0510 00:43:25.423829 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.424052 kubelet[1947]: E0510 00:43:25.424030 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.424052 kubelet[1947]: W0510 00:43:25.424044 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.424272 kubelet[1947]: E0510 00:43:25.424244 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.425500 kubelet[1947]: E0510 00:43:25.424591 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.425500 kubelet[1947]: W0510 00:43:25.424602 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.425500 kubelet[1947]: E0510 00:43:25.424638 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.425500 kubelet[1947]: E0510 00:43:25.424808 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.425500 kubelet[1947]: W0510 00:43:25.424817 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.425500 kubelet[1947]: E0510 00:43:25.424846 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.425500 kubelet[1947]: E0510 00:43:25.425010 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.425500 kubelet[1947]: W0510 00:43:25.425018 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.425500 kubelet[1947]: E0510 00:43:25.425040 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.425500 kubelet[1947]: E0510 00:43:25.425268 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.424718 systemd[1]: Started cri-containerd-521ccea053ccf7bb5ffb2e4e9795585e467a7241c2fc11a614dff269a577fd86.scope. May 10 00:43:25.425928 kubelet[1947]: W0510 00:43:25.425276 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.425928 kubelet[1947]: E0510 00:43:25.425292 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.425928 kubelet[1947]: E0510 00:43:25.425499 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.425928 kubelet[1947]: W0510 00:43:25.425506 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.425928 kubelet[1947]: E0510 00:43:25.425517 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.425928 kubelet[1947]: E0510 00:43:25.425873 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.425928 kubelet[1947]: W0510 00:43:25.425891 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.425928 kubelet[1947]: E0510 00:43:25.425902 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.427117 kubelet[1947]: E0510 00:43:25.427094 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.427117 kubelet[1947]: W0510 00:43:25.427107 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.427117 kubelet[1947]: E0510 00:43:25.427117 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.427352 kubelet[1947]: E0510 00:43:25.427310 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.427352 kubelet[1947]: W0510 00:43:25.427321 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.427352 kubelet[1947]: E0510 00:43:25.427332 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.435000 audit: BPF prog-id=115 op=LOAD May 10 00:43:25.436194 kubelet[1947]: E0510 00:43:25.435895 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:25.436194 kubelet[1947]: W0510 00:43:25.435912 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:25.436194 kubelet[1947]: E0510 00:43:25.435936 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:25.435000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.435000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2341 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:25.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532316363656130353363636637626235666662326534653937393535 May 10 00:43:25.435000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.435000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2341 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:25.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532316363656130353363636637626235666662326534653937393535 May 10 00:43:25.435000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.435000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.435000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.435000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.435000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.435000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.435000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.435000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.435000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.435000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.435000 audit: BPF prog-id=116 op=LOAD May 10 00:43:25.435000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000ad350 items=0 ppid=2341 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:25.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532316363656130353363636637626235666662326534653937393535 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit: BPF prog-id=117 op=LOAD May 10 00:43:25.436000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000ad398 items=0 ppid=2341 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:25.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532316363656130353363636637626235666662326534653937393535 May 10 00:43:25.436000 audit: BPF prog-id=117 op=UNLOAD May 10 00:43:25.436000 audit: BPF prog-id=116 op=UNLOAD May 10 00:43:25.436000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.436000 audit: BPF prog-id=118 op=LOAD May 10 00:43:25.436000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000ad7a8 items=0 ppid=2341 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:25.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532316363656130353363636637626235666662326534653937393535 May 10 00:43:25.455715 kubelet[1947]: E0510 00:43:25.455694 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:25.457009 env[1202]: time="2025-05-10T00:43:25.456363445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nnvm8,Uid:b401bee4-6367-40b6-9f82-ae8968e3ec29,Namespace:calico-system,Attempt:0,}" May 10 00:43:25.466457 env[1202]: time="2025-05-10T00:43:25.466406962Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-64fb8c8bf4-5kdh4,Uid:905aef5e-7a16-45bb-962c-c2edcfd63c55,Namespace:calico-system,Attempt:0,} returns sandbox id \"521ccea053ccf7bb5ffb2e4e9795585e467a7241c2fc11a614dff269a577fd86\"" May 10 00:43:25.467245 kubelet[1947]: E0510 00:43:25.467214 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:25.468356 env[1202]: time="2025-05-10T00:43:25.468333900Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 10 00:43:25.476681 env[1202]: time="2025-05-10T00:43:25.476602627Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:43:25.476804 env[1202]: time="2025-05-10T00:43:25.476667421Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:43:25.476804 env[1202]: time="2025-05-10T00:43:25.476684102Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:43:25.476994 env[1202]: time="2025-05-10T00:43:25.476943294Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d2f63cd2253e7549a8fdd02b547d8e9ba07511ac7b2170446c00d567dc59f2d6 pid=2410 runtime=io.containerd.runc.v2 May 10 00:43:25.490429 systemd[1]: Started cri-containerd-d2f63cd2253e7549a8fdd02b547d8e9ba07511ac7b2170446c00d567dc59f2d6.scope. May 10 00:43:25.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.505000 audit: BPF prog-id=119 op=LOAD May 10 00:43:25.506000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2410 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:25.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663633636432323533653735343961386664643032623534376438 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2410 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:25.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663633636432323533653735343961386664643032623534376438 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit: BPF prog-id=120 op=LOAD May 10 00:43:25.506000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d7b20 items=0 ppid=2410 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:25.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663633636432323533653735343961386664643032623534376438 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit: BPF prog-id=121 op=LOAD May 10 00:43:25.506000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d7b68 items=0 ppid=2410 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:25.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663633636432323533653735343961386664643032623534376438 May 10 00:43:25.506000 audit: BPF prog-id=121 op=UNLOAD May 10 00:43:25.506000 audit: BPF prog-id=120 op=UNLOAD May 10 00:43:25.506000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:25.506000 audit: BPF prog-id=122 op=LOAD May 10 00:43:25.506000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d7f78 items=0 ppid=2410 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:25.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663633636432323533653735343961386664643032623534376438 May 10 00:43:25.518263 env[1202]: time="2025-05-10T00:43:25.518202872Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nnvm8,Uid:b401bee4-6367-40b6-9f82-ae8968e3ec29,Namespace:calico-system,Attempt:0,} returns sandbox id \"d2f63cd2253e7549a8fdd02b547d8e9ba07511ac7b2170446c00d567dc59f2d6\"" May 10 00:43:25.518945 kubelet[1947]: E0510 00:43:25.518921 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:25.895000 audit[2446]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:25.895000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffcb470c0d0 a2=0 a3=7ffcb470c0bc items=0 ppid=2096 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:25.895000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:25.899000 audit[2446]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:25.899000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcb470c0d0 a2=0 a3=0 items=0 ppid=2096 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:25.899000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:26.742372 kubelet[1947]: E0510 00:43:26.742311 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kzprd" podUID="b7f06332-7253-4fd1-8fe2-c3b993295a9a" May 10 00:43:27.730127 update_engine[1196]: I0510 00:43:27.730032 1196 update_attempter.cc:509] Updating boot flags... May 10 00:43:27.740174 env[1202]: time="2025-05-10T00:43:27.740128123Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:27.742795 env[1202]: time="2025-05-10T00:43:27.742742008Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:27.749575 env[1202]: time="2025-05-10T00:43:27.749522100Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:27.776566 env[1202]: time="2025-05-10T00:43:27.757493973Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:27.776566 env[1202]: time="2025-05-10T00:43:27.757814240Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 10 00:43:27.776566 env[1202]: time="2025-05-10T00:43:27.760413236Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 00:43:27.776566 env[1202]: time="2025-05-10T00:43:27.765832830Z" level=info msg="CreateContainer within sandbox \"521ccea053ccf7bb5ffb2e4e9795585e467a7241c2fc11a614dff269a577fd86\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 10 00:43:27.939565 env[1202]: time="2025-05-10T00:43:27.939487341Z" level=info msg="CreateContainer within sandbox \"521ccea053ccf7bb5ffb2e4e9795585e467a7241c2fc11a614dff269a577fd86\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"debae2e828b050c2027a8a3ebaae7c97dfed252824f65157074f8abed80405bf\"" May 10 00:43:27.940011 env[1202]: time="2025-05-10T00:43:27.939977790Z" level=info msg="StartContainer for \"debae2e828b050c2027a8a3ebaae7c97dfed252824f65157074f8abed80405bf\"" May 10 00:43:27.964310 systemd[1]: Started cri-containerd-debae2e828b050c2027a8a3ebaae7c97dfed252824f65157074f8abed80405bf.scope. May 10 00:43:27.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.975743 kernel: kauditd_printk_skb: 179 callbacks suppressed May 10 00:43:27.975810 kernel: audit: type=1400 audit(1746837807.974:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.982281 kernel: audit: type=1400 audit(1746837807.974:968): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.982350 kernel: audit: type=1400 audit(1746837807.974:969): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.988596 kernel: audit: type=1400 audit(1746837807.974:970): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.988662 kernel: audit: type=1400 audit(1746837807.974:971): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.996324 kernel: audit: type=1400 audit(1746837807.974:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.996386 kernel: audit: type=1400 audit(1746837807.974:973): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:28.002380 kernel: audit: type=1400 audit(1746837807.974:974): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:28.002443 kernel: audit: type=1400 audit(1746837807.974:975): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:28.008777 kernel: audit: type=1400 audit(1746837807.978:976): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.978000 audit: BPF prog-id=123 op=LOAD May 10 00:43:27.978000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.978000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2341 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:27.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465626165326538323862303530633230323761386133656261616537 May 10 00:43:27.978000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.978000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2341 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:27.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465626165326538323862303530633230323761386133656261616537 May 10 00:43:27.978000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.978000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.978000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.978000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.978000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.978000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.978000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.978000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.978000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.978000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.978000 audit: BPF prog-id=124 op=LOAD May 10 00:43:27.978000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002d5d10 items=0 ppid=2341 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:27.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465626165326538323862303530633230323761386133656261616537 May 10 00:43:27.981000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.981000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.981000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.981000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.981000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.981000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.981000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.981000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.981000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.981000 audit: BPF prog-id=125 op=LOAD May 10 00:43:27.981000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002d5d58 items=0 ppid=2341 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:27.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465626165326538323862303530633230323761386133656261616537 May 10 00:43:27.984000 audit: BPF prog-id=125 op=UNLOAD May 10 00:43:27.984000 audit: BPF prog-id=124 op=UNLOAD May 10 00:43:27.984000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.984000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.984000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.984000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.984000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.984000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.984000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.984000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.984000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.984000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:27.984000 audit: BPF prog-id=126 op=LOAD May 10 00:43:27.984000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003be168 items=0 ppid=2341 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:27.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465626165326538323862303530633230323761386133656261616537 May 10 00:43:28.034596 env[1202]: time="2025-05-10T00:43:28.031938310Z" level=info msg="StartContainer for \"debae2e828b050c2027a8a3ebaae7c97dfed252824f65157074f8abed80405bf\" returns successfully" May 10 00:43:28.742972 kubelet[1947]: E0510 00:43:28.742910 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kzprd" podUID="b7f06332-7253-4fd1-8fe2-c3b993295a9a" May 10 00:43:28.788010 kubelet[1947]: E0510 00:43:28.787928 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:28.798238 kubelet[1947]: I0510 00:43:28.798176 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-64fb8c8bf4-5kdh4" podStartSLOduration=1.506866075 podStartE2EDuration="3.798159812s" podCreationTimestamp="2025-05-10 00:43:25 +0000 UTC" firstStartedPulling="2025-05-10 00:43:25.46803872 +0000 UTC m=+12.800694168" lastFinishedPulling="2025-05-10 00:43:27.759332447 +0000 UTC m=+15.091987905" observedRunningTime="2025-05-10 00:43:28.797893007 +0000 UTC m=+16.130548475" watchObservedRunningTime="2025-05-10 00:43:28.798159812 +0000 UTC m=+16.130815270" May 10 00:43:28.831338 kubelet[1947]: E0510 00:43:28.831294 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.831338 kubelet[1947]: W0510 00:43:28.831329 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.831565 kubelet[1947]: E0510 00:43:28.831360 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.831596 kubelet[1947]: E0510 00:43:28.831583 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.831596 kubelet[1947]: W0510 00:43:28.831591 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.831663 kubelet[1947]: E0510 00:43:28.831599 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.831806 kubelet[1947]: E0510 00:43:28.831783 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.831806 kubelet[1947]: W0510 00:43:28.831798 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.831909 kubelet[1947]: E0510 00:43:28.831809 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.832123 kubelet[1947]: E0510 00:43:28.832093 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.832123 kubelet[1947]: W0510 00:43:28.832112 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.832123 kubelet[1947]: E0510 00:43:28.832125 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.832488 kubelet[1947]: E0510 00:43:28.832467 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.832488 kubelet[1947]: W0510 00:43:28.832482 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.832644 kubelet[1947]: E0510 00:43:28.832538 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.832726 kubelet[1947]: E0510 00:43:28.832710 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.832726 kubelet[1947]: W0510 00:43:28.832722 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.832839 kubelet[1947]: E0510 00:43:28.832730 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.832958 kubelet[1947]: E0510 00:43:28.832933 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.833010 kubelet[1947]: W0510 00:43:28.832958 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.833010 kubelet[1947]: E0510 00:43:28.832987 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.833245 kubelet[1947]: E0510 00:43:28.833228 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.833245 kubelet[1947]: W0510 00:43:28.833242 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.833339 kubelet[1947]: E0510 00:43:28.833253 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.833625 kubelet[1947]: E0510 00:43:28.833605 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.833625 kubelet[1947]: W0510 00:43:28.833623 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.833720 kubelet[1947]: E0510 00:43:28.833639 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.833844 kubelet[1947]: E0510 00:43:28.833823 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.833844 kubelet[1947]: W0510 00:43:28.833841 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.833990 kubelet[1947]: E0510 00:43:28.833852 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.834030 kubelet[1947]: E0510 00:43:28.834014 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.834030 kubelet[1947]: W0510 00:43:28.834022 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.834030 kubelet[1947]: E0510 00:43:28.834030 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.834155 kubelet[1947]: E0510 00:43:28.834139 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.834155 kubelet[1947]: W0510 00:43:28.834149 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.834155 kubelet[1947]: E0510 00:43:28.834155 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.834313 kubelet[1947]: E0510 00:43:28.834293 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.834313 kubelet[1947]: W0510 00:43:28.834307 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.834313 kubelet[1947]: E0510 00:43:28.834316 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.834459 kubelet[1947]: E0510 00:43:28.834444 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.834459 kubelet[1947]: W0510 00:43:28.834453 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.834459 kubelet[1947]: E0510 00:43:28.834459 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.834622 kubelet[1947]: E0510 00:43:28.834608 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.834622 kubelet[1947]: W0510 00:43:28.834619 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.834808 kubelet[1947]: E0510 00:43:28.834626 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.844042 kubelet[1947]: E0510 00:43:28.844007 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.844042 kubelet[1947]: W0510 00:43:28.844025 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.844042 kubelet[1947]: E0510 00:43:28.844036 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.844277 kubelet[1947]: E0510 00:43:28.844247 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.844277 kubelet[1947]: W0510 00:43:28.844260 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.844277 kubelet[1947]: E0510 00:43:28.844273 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.844469 kubelet[1947]: E0510 00:43:28.844453 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.844469 kubelet[1947]: W0510 00:43:28.844464 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.844668 kubelet[1947]: E0510 00:43:28.844476 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.844668 kubelet[1947]: E0510 00:43:28.844648 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.844668 kubelet[1947]: W0510 00:43:28.844664 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.844776 kubelet[1947]: E0510 00:43:28.844691 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.844863 kubelet[1947]: E0510 00:43:28.844837 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.844863 kubelet[1947]: W0510 00:43:28.844851 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.844863 kubelet[1947]: E0510 00:43:28.844865 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.845048 kubelet[1947]: E0510 00:43:28.845026 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.845048 kubelet[1947]: W0510 00:43:28.845037 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.845048 kubelet[1947]: E0510 00:43:28.845049 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.845270 kubelet[1947]: E0510 00:43:28.845243 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.845270 kubelet[1947]: W0510 00:43:28.845265 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.845342 kubelet[1947]: E0510 00:43:28.845291 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.845535 kubelet[1947]: E0510 00:43:28.845520 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.845535 kubelet[1947]: W0510 00:43:28.845530 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.845650 kubelet[1947]: E0510 00:43:28.845575 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.845745 kubelet[1947]: E0510 00:43:28.845731 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.845745 kubelet[1947]: W0510 00:43:28.845742 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.845837 kubelet[1947]: E0510 00:43:28.845772 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.845990 kubelet[1947]: E0510 00:43:28.845956 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.845990 kubelet[1947]: W0510 00:43:28.845969 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.845990 kubelet[1947]: E0510 00:43:28.845986 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.846201 kubelet[1947]: E0510 00:43:28.846185 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.846201 kubelet[1947]: W0510 00:43:28.846196 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.846297 kubelet[1947]: E0510 00:43:28.846209 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.846375 kubelet[1947]: E0510 00:43:28.846357 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.846375 kubelet[1947]: W0510 00:43:28.846370 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.846452 kubelet[1947]: E0510 00:43:28.846384 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.846595 kubelet[1947]: E0510 00:43:28.846579 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.846595 kubelet[1947]: W0510 00:43:28.846593 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.846694 kubelet[1947]: E0510 00:43:28.846607 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.846838 kubelet[1947]: E0510 00:43:28.846821 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.846838 kubelet[1947]: W0510 00:43:28.846833 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.846940 kubelet[1947]: E0510 00:43:28.846846 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.847076 kubelet[1947]: E0510 00:43:28.847057 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.847076 kubelet[1947]: W0510 00:43:28.847072 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.847154 kubelet[1947]: E0510 00:43:28.847088 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.847260 kubelet[1947]: E0510 00:43:28.847248 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.847293 kubelet[1947]: W0510 00:43:28.847259 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.847293 kubelet[1947]: E0510 00:43:28.847274 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.847443 kubelet[1947]: E0510 00:43:28.847433 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.847443 kubelet[1947]: W0510 00:43:28.847442 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.847510 kubelet[1947]: E0510 00:43:28.847449 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:28.847858 kubelet[1947]: E0510 00:43:28.847843 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:43:28.847858 kubelet[1947]: W0510 00:43:28.847855 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:43:28.847945 kubelet[1947]: E0510 00:43:28.847864 1947 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:43:29.148741 env[1202]: time="2025-05-10T00:43:29.148689059Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:29.151728 env[1202]: time="2025-05-10T00:43:29.151689249Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:29.154072 env[1202]: time="2025-05-10T00:43:29.153997590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:29.156017 env[1202]: time="2025-05-10T00:43:29.155983319Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:29.156491 env[1202]: time="2025-05-10T00:43:29.156460373Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 00:43:29.158912 env[1202]: time="2025-05-10T00:43:29.158865295Z" level=info msg="CreateContainer within sandbox \"d2f63cd2253e7549a8fdd02b547d8e9ba07511ac7b2170446c00d567dc59f2d6\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:43:29.175481 env[1202]: time="2025-05-10T00:43:29.175401363Z" level=info msg="CreateContainer within sandbox \"d2f63cd2253e7549a8fdd02b547d8e9ba07511ac7b2170446c00d567dc59f2d6\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"73669361ca67dcdcc1c59ffb843de7b74b555836796f77c3d17e5313c2f90612\"" May 10 00:43:29.177410 env[1202]: time="2025-05-10T00:43:29.176103582Z" level=info msg="StartContainer for \"73669361ca67dcdcc1c59ffb843de7b74b555836796f77c3d17e5313c2f90612\"" May 10 00:43:29.199626 systemd[1]: Started cri-containerd-73669361ca67dcdcc1c59ffb843de7b74b555836796f77c3d17e5313c2f90612.scope. May 10 00:43:29.219000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f336043b7c8 items=0 ppid=2410 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:29.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733363639333631636136376463646363316335396666623834336465 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit: BPF prog-id=127 op=LOAD May 10 00:43:29.219000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003b2118 items=0 ppid=2410 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:29.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733363639333631636136376463646363316335396666623834336465 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit: BPF prog-id=128 op=LOAD May 10 00:43:29.219000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003b2168 items=0 ppid=2410 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:29.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733363639333631636136376463646363316335396666623834336465 May 10 00:43:29.219000 audit: BPF prog-id=128 op=UNLOAD May 10 00:43:29.219000 audit: BPF prog-id=127 op=UNLOAD May 10 00:43:29.219000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:29.219000 audit: BPF prog-id=129 op=LOAD May 10 00:43:29.219000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003b21f8 items=0 ppid=2410 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:29.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733363639333631636136376463646363316335396666623834336465 May 10 00:43:29.236650 env[1202]: time="2025-05-10T00:43:29.236577203Z" level=info msg="StartContainer for \"73669361ca67dcdcc1c59ffb843de7b74b555836796f77c3d17e5313c2f90612\" returns successfully" May 10 00:43:29.248587 systemd[1]: cri-containerd-73669361ca67dcdcc1c59ffb843de7b74b555836796f77c3d17e5313c2f90612.scope: Deactivated successfully. May 10 00:43:29.252000 audit: BPF prog-id=129 op=UNLOAD May 10 00:43:29.271003 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-73669361ca67dcdcc1c59ffb843de7b74b555836796f77c3d17e5313c2f90612-rootfs.mount: Deactivated successfully. May 10 00:43:29.488584 env[1202]: time="2025-05-10T00:43:29.488436576Z" level=info msg="shim disconnected" id=73669361ca67dcdcc1c59ffb843de7b74b555836796f77c3d17e5313c2f90612 May 10 00:43:29.488584 env[1202]: time="2025-05-10T00:43:29.488489466Z" level=warning msg="cleaning up after shim disconnected" id=73669361ca67dcdcc1c59ffb843de7b74b555836796f77c3d17e5313c2f90612 namespace=k8s.io May 10 00:43:29.488584 env[1202]: time="2025-05-10T00:43:29.488502170Z" level=info msg="cleaning up dead shim" May 10 00:43:29.496883 env[1202]: time="2025-05-10T00:43:29.496827902Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:43:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2580 runtime=io.containerd.runc.v2\n" May 10 00:43:29.791425 kubelet[1947]: I0510 00:43:29.791287 1947 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:43:29.791914 kubelet[1947]: E0510 00:43:29.791617 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:29.791967 kubelet[1947]: E0510 00:43:29.791921 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:29.794197 env[1202]: time="2025-05-10T00:43:29.794142994Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 00:43:30.742321 kubelet[1947]: E0510 00:43:30.742245 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kzprd" podUID="b7f06332-7253-4fd1-8fe2-c3b993295a9a" May 10 00:43:32.744110 kubelet[1947]: E0510 00:43:32.744042 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kzprd" podUID="b7f06332-7253-4fd1-8fe2-c3b993295a9a" May 10 00:43:34.744817 kubelet[1947]: E0510 00:43:34.744770 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kzprd" podUID="b7f06332-7253-4fd1-8fe2-c3b993295a9a" May 10 00:43:36.742804 kubelet[1947]: E0510 00:43:36.742733 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kzprd" podUID="b7f06332-7253-4fd1-8fe2-c3b993295a9a" May 10 00:43:38.742033 kubelet[1947]: E0510 00:43:38.741972 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kzprd" podUID="b7f06332-7253-4fd1-8fe2-c3b993295a9a" May 10 00:43:38.906970 env[1202]: time="2025-05-10T00:43:38.906886958Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:38.911295 env[1202]: time="2025-05-10T00:43:38.911213595Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:38.913739 env[1202]: time="2025-05-10T00:43:38.913639880Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:38.915893 env[1202]: time="2025-05-10T00:43:38.915807719Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:38.916424 env[1202]: time="2025-05-10T00:43:38.916379446Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 00:43:38.919180 env[1202]: time="2025-05-10T00:43:38.919125914Z" level=info msg="CreateContainer within sandbox \"d2f63cd2253e7549a8fdd02b547d8e9ba07511ac7b2170446c00d567dc59f2d6\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:43:38.936139 env[1202]: time="2025-05-10T00:43:38.936056658Z" level=info msg="CreateContainer within sandbox \"d2f63cd2253e7549a8fdd02b547d8e9ba07511ac7b2170446c00d567dc59f2d6\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"88d98f53cc47a5911a00d9f34f379cfb1eb03c579e3aa2d19b491976ca99d1e9\"" May 10 00:43:38.937076 env[1202]: time="2025-05-10T00:43:38.937007852Z" level=info msg="StartContainer for \"88d98f53cc47a5911a00d9f34f379cfb1eb03c579e3aa2d19b491976ca99d1e9\"" May 10 00:43:38.968948 systemd[1]: Started cri-containerd-88d98f53cc47a5911a00d9f34f379cfb1eb03c579e3aa2d19b491976ca99d1e9.scope. May 10 00:43:38.984000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.987134 kernel: kauditd_printk_skb: 91 callbacks suppressed May 10 00:43:38.987209 kernel: audit: type=1400 audit(1746837818.984:992): avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.996842 kernel: audit: type=1300 audit(1746837818.984:992): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6968c90c18 items=0 ppid=2410 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:38.997011 kernel: audit: type=1327 audit(1746837818.984:992): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838643938663533636334376135393131613030643966333466333739 May 10 00:43:38.984000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6968c90c18 items=0 ppid=2410 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:38.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838643938663533636334376135393131613030643966333466333739 May 10 00:43:38.984000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:39.022720 kernel: audit: type=1400 audit(1746837818.984:993): avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.984000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:39.034995 kernel: audit: type=1400 audit(1746837818.984:993): avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:39.035143 kernel: audit: type=1400 audit(1746837818.984:993): avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.984000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.984000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:39.043502 kernel: audit: type=1400 audit(1746837818.984:993): avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:39.043794 kernel: audit: type=1400 audit(1746837818.984:993): avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.984000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.984000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:39.071875 kernel: audit: type=1400 audit(1746837818.984:993): avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:39.072015 kernel: audit: type=1400 audit(1746837818.984:993): avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.984000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.984000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.984000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.984000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.984000 audit: BPF prog-id=130 op=LOAD May 10 00:43:38.984000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027a528 items=0 ppid=2410 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:38.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838643938663533636334376135393131613030643966333466333739 May 10 00:43:38.989000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.989000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.989000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.989000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.989000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.989000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.989000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.989000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.989000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.989000 audit: BPF prog-id=131 op=LOAD May 10 00:43:38.989000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027a578 items=0 ppid=2410 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:38.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838643938663533636334376135393131613030643966333466333739 May 10 00:43:38.995000 audit: BPF prog-id=131 op=UNLOAD May 10 00:43:38.995000 audit: BPF prog-id=130 op=UNLOAD May 10 00:43:38.995000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.995000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.995000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.995000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.995000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.995000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.995000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.995000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.995000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.995000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:38.995000 audit: BPF prog-id=132 op=LOAD May 10 00:43:38.995000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027a608 items=0 ppid=2410 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:38.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838643938663533636334376135393131613030643966333466333739 May 10 00:43:39.797903 systemd[1]: Started sshd@7-10.0.0.88:22-10.0.0.1:54090.service. May 10 00:43:39.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.88:22-10.0.0.1:54090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:39.845000 audit[2635]: USER_ACCT pid=2635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:39.847262 sshd[2635]: Accepted publickey for core from 10.0.0.1 port 54090 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:43:39.846000 audit[2635]: CRED_ACQ pid=2635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:39.846000 audit[2635]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2b361aa0 a2=3 a3=0 items=0 ppid=1 pid=2635 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:39.846000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:43:39.848356 sshd[2635]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:39.865782 systemd-logind[1191]: New session 8 of user core. May 10 00:43:39.866012 systemd[1]: Started session-8.scope. May 10 00:43:39.869000 audit[2635]: USER_START pid=2635 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:39.870000 audit[2637]: CRED_ACQ pid=2637 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:39.935518 env[1202]: time="2025-05-10T00:43:39.935438555Z" level=info msg="StartContainer for \"88d98f53cc47a5911a00d9f34f379cfb1eb03c579e3aa2d19b491976ca99d1e9\" returns successfully" May 10 00:43:39.939094 kubelet[1947]: E0510 00:43:39.939010 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:40.120627 sshd[2635]: pam_unix(sshd:session): session closed for user core May 10 00:43:40.120000 audit[2635]: USER_END pid=2635 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:40.120000 audit[2635]: CRED_DISP pid=2635 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:40.123694 systemd[1]: sshd@7-10.0.0.88:22-10.0.0.1:54090.service: Deactivated successfully. May 10 00:43:40.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.88:22-10.0.0.1:54090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:40.124729 systemd[1]: session-8.scope: Deactivated successfully. May 10 00:43:40.125536 systemd-logind[1191]: Session 8 logged out. Waiting for processes to exit. May 10 00:43:40.126492 systemd-logind[1191]: Removed session 8. May 10 00:43:40.742689 kubelet[1947]: E0510 00:43:40.742628 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kzprd" podUID="b7f06332-7253-4fd1-8fe2-c3b993295a9a" May 10 00:43:40.941036 kubelet[1947]: E0510 00:43:40.940979 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:41.693849 env[1202]: time="2025-05-10T00:43:41.693742705Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:43:41.696059 systemd[1]: cri-containerd-88d98f53cc47a5911a00d9f34f379cfb1eb03c579e3aa2d19b491976ca99d1e9.scope: Deactivated successfully. May 10 00:43:41.700000 audit: BPF prog-id=132 op=UNLOAD May 10 00:43:41.705997 kubelet[1947]: I0510 00:43:41.705963 1947 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 10 00:43:41.719624 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-88d98f53cc47a5911a00d9f34f379cfb1eb03c579e3aa2d19b491976ca99d1e9-rootfs.mount: Deactivated successfully. May 10 00:43:41.731386 env[1202]: time="2025-05-10T00:43:41.731306638Z" level=info msg="shim disconnected" id=88d98f53cc47a5911a00d9f34f379cfb1eb03c579e3aa2d19b491976ca99d1e9 May 10 00:43:41.731386 env[1202]: time="2025-05-10T00:43:41.731371389Z" level=warning msg="cleaning up after shim disconnected" id=88d98f53cc47a5911a00d9f34f379cfb1eb03c579e3aa2d19b491976ca99d1e9 namespace=k8s.io May 10 00:43:41.731386 env[1202]: time="2025-05-10T00:43:41.731388923Z" level=info msg="cleaning up dead shim" May 10 00:43:41.741136 systemd[1]: Created slice kubepods-burstable-podcb7ed29e_de46_4390_9af6_2667bd2e5356.slice. May 10 00:43:41.748001 env[1202]: time="2025-05-10T00:43:41.747950081Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:43:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2666 runtime=io.containerd.runc.v2\n" May 10 00:43:41.748505 systemd[1]: Created slice kubepods-besteffort-pod7ecea60d_bb21_4a1a_9b83_d60da1b2b52e.slice. May 10 00:43:41.755671 systemd[1]: Created slice kubepods-besteffort-pod43a0790b_1277_4d8d_9090_56e515ec4483.slice. May 10 00:43:41.763050 systemd[1]: Created slice kubepods-burstable-podd9cc7394_13d8_4c39_a526_a2a634d11caf.slice. May 10 00:43:41.767624 systemd[1]: Created slice kubepods-besteffort-pode1ab1f44_27b3_46b9_a7e4_77683e1e7dd6.slice. May 10 00:43:41.794340 kubelet[1947]: I0510 00:43:41.794294 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d9cc7394-13d8-4c39-a526-a2a634d11caf-config-volume\") pod \"coredns-668d6bf9bc-bvxzp\" (UID: \"d9cc7394-13d8-4c39-a526-a2a634d11caf\") " pod="kube-system/coredns-668d6bf9bc-bvxzp" May 10 00:43:41.794340 kubelet[1947]: I0510 00:43:41.794330 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/cb7ed29e-de46-4390-9af6-2667bd2e5356-config-volume\") pod \"coredns-668d6bf9bc-tqt8t\" (UID: \"cb7ed29e-de46-4390-9af6-2667bd2e5356\") " pod="kube-system/coredns-668d6bf9bc-tqt8t" May 10 00:43:41.794340 kubelet[1947]: I0510 00:43:41.794348 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/43a0790b-1277-4d8d-9090-56e515ec4483-calico-apiserver-certs\") pod \"calico-apiserver-7c5689859f-l879k\" (UID: \"43a0790b-1277-4d8d-9090-56e515ec4483\") " pod="calico-apiserver/calico-apiserver-7c5689859f-l879k" May 10 00:43:41.794610 kubelet[1947]: I0510 00:43:41.794386 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r7tql\" (UniqueName: \"kubernetes.io/projected/43a0790b-1277-4d8d-9090-56e515ec4483-kube-api-access-r7tql\") pod \"calico-apiserver-7c5689859f-l879k\" (UID: \"43a0790b-1277-4d8d-9090-56e515ec4483\") " pod="calico-apiserver/calico-apiserver-7c5689859f-l879k" May 10 00:43:41.794610 kubelet[1947]: I0510 00:43:41.794402 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bwq97\" (UniqueName: \"kubernetes.io/projected/7ecea60d-bb21-4a1a-9b83-d60da1b2b52e-kube-api-access-bwq97\") pod \"calico-kube-controllers-564c889779-cshdq\" (UID: \"7ecea60d-bb21-4a1a-9b83-d60da1b2b52e\") " pod="calico-system/calico-kube-controllers-564c889779-cshdq" May 10 00:43:41.794610 kubelet[1947]: I0510 00:43:41.794417 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-njxxg\" (UniqueName: \"kubernetes.io/projected/cb7ed29e-de46-4390-9af6-2667bd2e5356-kube-api-access-njxxg\") pod \"coredns-668d6bf9bc-tqt8t\" (UID: \"cb7ed29e-de46-4390-9af6-2667bd2e5356\") " pod="kube-system/coredns-668d6bf9bc-tqt8t" May 10 00:43:41.794610 kubelet[1947]: I0510 00:43:41.794436 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gh747\" (UniqueName: \"kubernetes.io/projected/e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6-kube-api-access-gh747\") pod \"calico-apiserver-7c5689859f-kwbfr\" (UID: \"e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6\") " pod="calico-apiserver/calico-apiserver-7c5689859f-kwbfr" May 10 00:43:41.794610 kubelet[1947]: I0510 00:43:41.794450 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2w25l\" (UniqueName: \"kubernetes.io/projected/d9cc7394-13d8-4c39-a526-a2a634d11caf-kube-api-access-2w25l\") pod \"coredns-668d6bf9bc-bvxzp\" (UID: \"d9cc7394-13d8-4c39-a526-a2a634d11caf\") " pod="kube-system/coredns-668d6bf9bc-bvxzp" May 10 00:43:41.794757 kubelet[1947]: I0510 00:43:41.794483 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6-calico-apiserver-certs\") pod \"calico-apiserver-7c5689859f-kwbfr\" (UID: \"e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6\") " pod="calico-apiserver/calico-apiserver-7c5689859f-kwbfr" May 10 00:43:41.794757 kubelet[1947]: I0510 00:43:41.794498 1947 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7ecea60d-bb21-4a1a-9b83-d60da1b2b52e-tigera-ca-bundle\") pod \"calico-kube-controllers-564c889779-cshdq\" (UID: \"7ecea60d-bb21-4a1a-9b83-d60da1b2b52e\") " pod="calico-system/calico-kube-controllers-564c889779-cshdq" May 10 00:43:41.945264 kubelet[1947]: E0510 00:43:41.944306 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:41.945816 env[1202]: time="2025-05-10T00:43:41.945779992Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 00:43:42.044732 kubelet[1947]: E0510 00:43:42.044662 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:42.045686 env[1202]: time="2025-05-10T00:43:42.045629736Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-tqt8t,Uid:cb7ed29e-de46-4390-9af6-2667bd2e5356,Namespace:kube-system,Attempt:0,}" May 10 00:43:42.053643 env[1202]: time="2025-05-10T00:43:42.053599616Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-564c889779-cshdq,Uid:7ecea60d-bb21-4a1a-9b83-d60da1b2b52e,Namespace:calico-system,Attempt:0,}" May 10 00:43:42.060144 env[1202]: time="2025-05-10T00:43:42.060105178Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c5689859f-l879k,Uid:43a0790b-1277-4d8d-9090-56e515ec4483,Namespace:calico-apiserver,Attempt:0,}" May 10 00:43:42.065395 kubelet[1947]: E0510 00:43:42.065351 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:42.066236 env[1202]: time="2025-05-10T00:43:42.066201358Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-bvxzp,Uid:d9cc7394-13d8-4c39-a526-a2a634d11caf,Namespace:kube-system,Attempt:0,}" May 10 00:43:42.070734 env[1202]: time="2025-05-10T00:43:42.070686085Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c5689859f-kwbfr,Uid:e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6,Namespace:calico-apiserver,Attempt:0,}" May 10 00:43:42.166590 env[1202]: time="2025-05-10T00:43:42.166462961Z" level=error msg="Failed to destroy network for sandbox \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.166982 env[1202]: time="2025-05-10T00:43:42.166938165Z" level=error msg="encountered an error cleaning up failed sandbox \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.167043 env[1202]: time="2025-05-10T00:43:42.167002337Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c5689859f-l879k,Uid:43a0790b-1277-4d8d-9090-56e515ec4483,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.167356 kubelet[1947]: E0510 00:43:42.167298 1947 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.167558 kubelet[1947]: E0510 00:43:42.167400 1947 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7c5689859f-l879k" May 10 00:43:42.167558 kubelet[1947]: E0510 00:43:42.167435 1947 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7c5689859f-l879k" May 10 00:43:42.167558 kubelet[1947]: E0510 00:43:42.167496 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7c5689859f-l879k_calico-apiserver(43a0790b-1277-4d8d-9090-56e515ec4483)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7c5689859f-l879k_calico-apiserver(43a0790b-1277-4d8d-9090-56e515ec4483)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c5689859f-l879k" podUID="43a0790b-1277-4d8d-9090-56e515ec4483" May 10 00:43:42.174161 env[1202]: time="2025-05-10T00:43:42.174098291Z" level=error msg="Failed to destroy network for sandbox \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.174633 env[1202]: time="2025-05-10T00:43:42.174603070Z" level=error msg="encountered an error cleaning up failed sandbox \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.174787 env[1202]: time="2025-05-10T00:43:42.174756490Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-564c889779-cshdq,Uid:7ecea60d-bb21-4a1a-9b83-d60da1b2b52e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.175190 kubelet[1947]: E0510 00:43:42.175136 1947 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.175269 kubelet[1947]: E0510 00:43:42.175214 1947 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-564c889779-cshdq" May 10 00:43:42.175269 kubelet[1947]: E0510 00:43:42.175247 1947 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-564c889779-cshdq" May 10 00:43:42.175326 kubelet[1947]: E0510 00:43:42.175292 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-564c889779-cshdq_calico-system(7ecea60d-bb21-4a1a-9b83-d60da1b2b52e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-564c889779-cshdq_calico-system(7ecea60d-bb21-4a1a-9b83-d60da1b2b52e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-564c889779-cshdq" podUID="7ecea60d-bb21-4a1a-9b83-d60da1b2b52e" May 10 00:43:42.190316 env[1202]: time="2025-05-10T00:43:42.190218058Z" level=error msg="Failed to destroy network for sandbox \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.190713 env[1202]: time="2025-05-10T00:43:42.190661133Z" level=error msg="encountered an error cleaning up failed sandbox \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.190815 env[1202]: time="2025-05-10T00:43:42.190787250Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-tqt8t,Uid:cb7ed29e-de46-4390-9af6-2667bd2e5356,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.191585 kubelet[1947]: E0510 00:43:42.190989 1947 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.191585 kubelet[1947]: E0510 00:43:42.191054 1947 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-tqt8t" May 10 00:43:42.191585 kubelet[1947]: E0510 00:43:42.191086 1947 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-tqt8t" May 10 00:43:42.191831 kubelet[1947]: E0510 00:43:42.191141 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-tqt8t_kube-system(cb7ed29e-de46-4390-9af6-2667bd2e5356)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-tqt8t_kube-system(cb7ed29e-de46-4390-9af6-2667bd2e5356)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-tqt8t" podUID="cb7ed29e-de46-4390-9af6-2667bd2e5356" May 10 00:43:42.199495 env[1202]: time="2025-05-10T00:43:42.198249865Z" level=error msg="Failed to destroy network for sandbox \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.199495 env[1202]: time="2025-05-10T00:43:42.198673282Z" level=error msg="encountered an error cleaning up failed sandbox \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.199495 env[1202]: time="2025-05-10T00:43:42.198734638Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c5689859f-kwbfr,Uid:e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.199844 kubelet[1947]: E0510 00:43:42.198952 1947 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.199844 kubelet[1947]: E0510 00:43:42.199009 1947 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7c5689859f-kwbfr" May 10 00:43:42.199844 kubelet[1947]: E0510 00:43:42.199029 1947 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7c5689859f-kwbfr" May 10 00:43:42.199976 kubelet[1947]: E0510 00:43:42.199075 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7c5689859f-kwbfr_calico-apiserver(e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7c5689859f-kwbfr_calico-apiserver(e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c5689859f-kwbfr" podUID="e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6" May 10 00:43:42.210283 env[1202]: time="2025-05-10T00:43:42.210200792Z" level=error msg="Failed to destroy network for sandbox \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.210594 env[1202]: time="2025-05-10T00:43:42.210559407Z" level=error msg="encountered an error cleaning up failed sandbox \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.210664 env[1202]: time="2025-05-10T00:43:42.210619040Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-bvxzp,Uid:d9cc7394-13d8-4c39-a526-a2a634d11caf,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.210896 kubelet[1947]: E0510 00:43:42.210855 1947 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.210974 kubelet[1947]: E0510 00:43:42.210923 1947 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-bvxzp" May 10 00:43:42.210974 kubelet[1947]: E0510 00:43:42.210951 1947 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-bvxzp" May 10 00:43:42.211065 kubelet[1947]: E0510 00:43:42.211005 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-bvxzp_kube-system(d9cc7394-13d8-4c39-a526-a2a634d11caf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-bvxzp_kube-system(d9cc7394-13d8-4c39-a526-a2a634d11caf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-bvxzp" podUID="d9cc7394-13d8-4c39-a526-a2a634d11caf" May 10 00:43:42.748348 systemd[1]: Created slice kubepods-besteffort-podb7f06332_7253_4fd1_8fe2_c3b993295a9a.slice. May 10 00:43:42.750773 env[1202]: time="2025-05-10T00:43:42.750724206Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kzprd,Uid:b7f06332-7253-4fd1-8fe2-c3b993295a9a,Namespace:calico-system,Attempt:0,}" May 10 00:43:42.818874 env[1202]: time="2025-05-10T00:43:42.818802557Z" level=error msg="Failed to destroy network for sandbox \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.819255 env[1202]: time="2025-05-10T00:43:42.819211648Z" level=error msg="encountered an error cleaning up failed sandbox \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.819531 env[1202]: time="2025-05-10T00:43:42.819492276Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kzprd,Uid:b7f06332-7253-4fd1-8fe2-c3b993295a9a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.820918 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8-shm.mount: Deactivated successfully. May 10 00:43:42.822107 kubelet[1947]: E0510 00:43:42.822062 1947 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.822187 kubelet[1947]: E0510 00:43:42.822123 1947 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kzprd" May 10 00:43:42.822187 kubelet[1947]: E0510 00:43:42.822143 1947 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kzprd" May 10 00:43:42.822266 kubelet[1947]: E0510 00:43:42.822187 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-kzprd_calico-system(b7f06332-7253-4fd1-8fe2-c3b993295a9a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-kzprd_calico-system(b7f06332-7253-4fd1-8fe2-c3b993295a9a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kzprd" podUID="b7f06332-7253-4fd1-8fe2-c3b993295a9a" May 10 00:43:42.947339 kubelet[1947]: I0510 00:43:42.947287 1947 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" May 10 00:43:42.949395 env[1202]: time="2025-05-10T00:43:42.948047473Z" level=info msg="StopPodSandbox for \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\"" May 10 00:43:42.949395 env[1202]: time="2025-05-10T00:43:42.948767819Z" level=info msg="StopPodSandbox for \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\"" May 10 00:43:42.949572 kubelet[1947]: I0510 00:43:42.948352 1947 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" May 10 00:43:42.950568 kubelet[1947]: I0510 00:43:42.950211 1947 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" May 10 00:43:42.950848 env[1202]: time="2025-05-10T00:43:42.950799927Z" level=info msg="StopPodSandbox for \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\"" May 10 00:43:42.954699 kubelet[1947]: I0510 00:43:42.954329 1947 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" May 10 00:43:42.955475 env[1202]: time="2025-05-10T00:43:42.955430107Z" level=info msg="StopPodSandbox for \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\"" May 10 00:43:42.955993 kubelet[1947]: I0510 00:43:42.955957 1947 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" May 10 00:43:42.956459 env[1202]: time="2025-05-10T00:43:42.956416193Z" level=info msg="StopPodSandbox for \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\"" May 10 00:43:42.958195 kubelet[1947]: I0510 00:43:42.957863 1947 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" May 10 00:43:42.958293 env[1202]: time="2025-05-10T00:43:42.958167933Z" level=info msg="StopPodSandbox for \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\"" May 10 00:43:42.988023 env[1202]: time="2025-05-10T00:43:42.987940674Z" level=error msg="StopPodSandbox for \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\" failed" error="failed to destroy network for sandbox \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:42.988261 kubelet[1947]: E0510 00:43:42.988228 1947 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" May 10 00:43:42.988393 kubelet[1947]: E0510 00:43:42.988298 1947 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155"} May 10 00:43:42.988457 kubelet[1947]: E0510 00:43:42.988418 1947 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"43a0790b-1277-4d8d-9090-56e515ec4483\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:43:42.988556 kubelet[1947]: E0510 00:43:42.988449 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"43a0790b-1277-4d8d-9090-56e515ec4483\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c5689859f-l879k" podUID="43a0790b-1277-4d8d-9090-56e515ec4483" May 10 00:43:43.006363 env[1202]: time="2025-05-10T00:43:43.006181324Z" level=error msg="StopPodSandbox for \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\" failed" error="failed to destroy network for sandbox \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:43.006524 kubelet[1947]: E0510 00:43:43.006471 1947 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" May 10 00:43:43.006608 kubelet[1947]: E0510 00:43:43.006531 1947 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9"} May 10 00:43:43.006608 kubelet[1947]: E0510 00:43:43.006580 1947 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7ecea60d-bb21-4a1a-9b83-d60da1b2b52e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:43:43.006908 kubelet[1947]: E0510 00:43:43.006603 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7ecea60d-bb21-4a1a-9b83-d60da1b2b52e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-564c889779-cshdq" podUID="7ecea60d-bb21-4a1a-9b83-d60da1b2b52e" May 10 00:43:43.011609 env[1202]: time="2025-05-10T00:43:43.011519865Z" level=error msg="StopPodSandbox for \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\" failed" error="failed to destroy network for sandbox \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:43.011835 kubelet[1947]: E0510 00:43:43.011795 1947 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" May 10 00:43:43.011928 kubelet[1947]: E0510 00:43:43.011837 1947 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c"} May 10 00:43:43.011928 kubelet[1947]: E0510 00:43:43.011869 1947 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:43:43.011928 kubelet[1947]: E0510 00:43:43.011889 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c5689859f-kwbfr" podUID="e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6" May 10 00:43:43.015037 env[1202]: time="2025-05-10T00:43:43.014979098Z" level=error msg="StopPodSandbox for \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\" failed" error="failed to destroy network for sandbox \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:43.015411 kubelet[1947]: E0510 00:43:43.015367 1947 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" May 10 00:43:43.015490 kubelet[1947]: E0510 00:43:43.015427 1947 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826"} May 10 00:43:43.015490 kubelet[1947]: E0510 00:43:43.015467 1947 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cb7ed29e-de46-4390-9af6-2667bd2e5356\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:43:43.015642 kubelet[1947]: E0510 00:43:43.015499 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cb7ed29e-de46-4390-9af6-2667bd2e5356\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-tqt8t" podUID="cb7ed29e-de46-4390-9af6-2667bd2e5356" May 10 00:43:43.018764 env[1202]: time="2025-05-10T00:43:43.018684395Z" level=error msg="StopPodSandbox for \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\" failed" error="failed to destroy network for sandbox \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:43.019054 kubelet[1947]: E0510 00:43:43.019020 1947 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" May 10 00:43:43.019054 kubelet[1947]: E0510 00:43:43.019062 1947 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818"} May 10 00:43:43.019167 kubelet[1947]: E0510 00:43:43.019090 1947 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d9cc7394-13d8-4c39-a526-a2a634d11caf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:43:43.019167 kubelet[1947]: E0510 00:43:43.019110 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d9cc7394-13d8-4c39-a526-a2a634d11caf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-bvxzp" podUID="d9cc7394-13d8-4c39-a526-a2a634d11caf" May 10 00:43:43.035035 env[1202]: time="2025-05-10T00:43:43.034948056Z" level=error msg="StopPodSandbox for \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\" failed" error="failed to destroy network for sandbox \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:43:43.035327 kubelet[1947]: E0510 00:43:43.035267 1947 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" May 10 00:43:43.035407 kubelet[1947]: E0510 00:43:43.035326 1947 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8"} May 10 00:43:43.035407 kubelet[1947]: E0510 00:43:43.035361 1947 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b7f06332-7253-4fd1-8fe2-c3b993295a9a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:43:43.035407 kubelet[1947]: E0510 00:43:43.035395 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b7f06332-7253-4fd1-8fe2-c3b993295a9a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kzprd" podUID="b7f06332-7253-4fd1-8fe2-c3b993295a9a" May 10 00:43:44.091809 kubelet[1947]: E0510 00:43:44.091771 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:44.122000 audit[3065]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:44.126280 kernel: kauditd_printk_skb: 45 callbacks suppressed May 10 00:43:44.126358 kernel: audit: type=1325 audit(1746837824.122:1008): table=filter:95 family=2 entries=17 op=nft_register_rule pid=3065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:44.122000 audit[3065]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe2fb51c90 a2=0 a3=7ffe2fb51c7c items=0 ppid=2096 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:44.135789 kernel: audit: type=1300 audit(1746837824.122:1008): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe2fb51c90 a2=0 a3=7ffe2fb51c7c items=0 ppid=2096 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:44.135836 kernel: audit: type=1327 audit(1746837824.122:1008): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:44.122000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:44.139000 audit[3065]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:44.139000 audit[3065]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe2fb51c90 a2=0 a3=7ffe2fb51c7c items=0 ppid=2096 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:44.149451 kernel: audit: type=1325 audit(1746837824.139:1009): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:44.149530 kernel: audit: type=1300 audit(1746837824.139:1009): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe2fb51c90 a2=0 a3=7ffe2fb51c7c items=0 ppid=2096 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:44.149582 kernel: audit: type=1327 audit(1746837824.139:1009): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:44.139000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:44.966569 kubelet[1947]: E0510 00:43:44.966451 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:45.125849 systemd[1]: Started sshd@8-10.0.0.88:22-10.0.0.1:54094.service. May 10 00:43:45.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.88:22-10.0.0.1:54094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:45.140594 kernel: audit: type=1130 audit(1746837825.124:1010): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.88:22-10.0.0.1:54094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:45.285000 audit[3067]: USER_ACCT pid=3067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:45.286955 sshd[3067]: Accepted publickey for core from 10.0.0.1 port 54094 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:43:45.358595 kernel: audit: type=1101 audit(1746837825.285:1011): pid=3067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:45.357000 audit[3067]: CRED_ACQ pid=3067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:45.359217 sshd[3067]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:45.363123 systemd-logind[1191]: New session 9 of user core. May 10 00:43:45.363880 systemd[1]: Started session-9.scope. May 10 00:43:45.364807 kernel: audit: type=1103 audit(1746837825.357:1012): pid=3067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:45.364893 kernel: audit: type=1006 audit(1746837825.357:1013): pid=3067 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 10 00:43:45.357000 audit[3067]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe06acce0 a2=3 a3=0 items=0 ppid=1 pid=3067 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:45.357000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:43:45.367000 audit[3067]: USER_START pid=3067 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:45.368000 audit[3069]: CRED_ACQ pid=3069 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:47.076480 sshd[3067]: pam_unix(sshd:session): session closed for user core May 10 00:43:47.075000 audit[3067]: USER_END pid=3067 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:47.076000 audit[3067]: CRED_DISP pid=3067 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:47.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.88:22-10.0.0.1:54094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:47.079013 systemd[1]: sshd@8-10.0.0.88:22-10.0.0.1:54094.service: Deactivated successfully. May 10 00:43:47.079922 systemd[1]: session-9.scope: Deactivated successfully. May 10 00:43:47.081210 systemd-logind[1191]: Session 9 logged out. Waiting for processes to exit. May 10 00:43:47.081933 systemd-logind[1191]: Removed session 9. May 10 00:43:50.863555 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1308301833.mount: Deactivated successfully. May 10 00:43:52.080769 systemd[1]: Started sshd@9-10.0.0.88:22-10.0.0.1:36524.service. May 10 00:43:53.108909 kernel: kauditd_printk_skb: 7 callbacks suppressed May 10 00:43:53.109020 kernel: audit: type=1130 audit(1746837832.079:1019): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.88:22-10.0.0.1:36524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:52.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.88:22-10.0.0.1:36524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.133804 env[1202]: time="2025-05-10T00:43:53.133749619Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:53.136233 env[1202]: time="2025-05-10T00:43:53.136197479Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:53.138289 env[1202]: time="2025-05-10T00:43:53.138241010Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:53.146158 env[1202]: time="2025-05-10T00:43:53.146087156Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:53.146595 env[1202]: time="2025-05-10T00:43:53.146515561Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 00:43:53.153000 audit[3085]: USER_ACCT pid=3085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:53.160342 sshd[3085]: Accepted publickey for core from 10.0.0.1 port 36524 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:43:53.160739 kernel: audit: type=1101 audit(1746837833.153:1020): pid=3085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:53.160776 kernel: audit: type=1103 audit(1746837833.159:1021): pid=3085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:53.159000 audit[3085]: CRED_ACQ pid=3085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:53.165374 sshd[3085]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:53.175330 kernel: audit: type=1006 audit(1746837833.159:1022): pid=3085 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 10 00:43:53.159000 audit[3085]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6578f450 a2=3 a3=0 items=0 ppid=1 pid=3085 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:53.176813 systemd-logind[1191]: New session 10 of user core. May 10 00:43:53.177133 systemd[1]: Started session-10.scope. May 10 00:43:53.180289 env[1202]: time="2025-05-10T00:43:53.180240064Z" level=info msg="CreateContainer within sandbox \"d2f63cd2253e7549a8fdd02b547d8e9ba07511ac7b2170446c00d567dc59f2d6\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:43:53.159000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:43:53.182463 kernel: audit: type=1300 audit(1746837833.159:1022): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6578f450 a2=3 a3=0 items=0 ppid=1 pid=3085 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:53.182556 kernel: audit: type=1327 audit(1746837833.159:1022): proctitle=737368643A20636F7265205B707269765D May 10 00:43:53.186000 audit[3085]: USER_START pid=3085 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:53.187000 audit[3090]: CRED_ACQ pid=3090 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:53.204963 kernel: audit: type=1105 audit(1746837833.186:1023): pid=3085 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:53.205087 kernel: audit: type=1103 audit(1746837833.187:1024): pid=3090 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:53.236224 env[1202]: time="2025-05-10T00:43:53.236166234Z" level=info msg="CreateContainer within sandbox \"d2f63cd2253e7549a8fdd02b547d8e9ba07511ac7b2170446c00d567dc59f2d6\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"c80e053f925aafe687f9d8929897d15075577a518dc6045b2b6edc0be0f1a991\"" May 10 00:43:53.238296 env[1202]: time="2025-05-10T00:43:53.238132289Z" level=info msg="StartContainer for \"c80e053f925aafe687f9d8929897d15075577a518dc6045b2b6edc0be0f1a991\"" May 10 00:43:53.263328 systemd[1]: Started cri-containerd-c80e053f925aafe687f9d8929897d15075577a518dc6045b2b6edc0be0f1a991.scope. May 10 00:43:53.281000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.287718 kernel: audit: type=1400 audit(1746837833.281:1025): avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.281000 audit[3108]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7955373358 items=0 ppid=2410 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:53.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338306530353366393235616166653638376639643839323938393764 May 10 00:43:53.281000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.281000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.281000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.281000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.294564 kernel: audit: type=1300 audit(1746837833.281:1025): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7955373358 items=0 ppid=2410 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:53.281000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.281000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.281000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.281000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.281000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.281000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.281000 audit: BPF prog-id=133 op=LOAD May 10 00:43:53.281000 audit[3108]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000292d38 items=0 ppid=2410 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:53.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338306530353366393235616166653638376639643839323938393764 May 10 00:43:53.285000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.285000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.285000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.285000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.285000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.285000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.285000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.285000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.285000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.285000 audit: BPF prog-id=134 op=LOAD May 10 00:43:53.285000 audit[3108]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000292d88 items=0 ppid=2410 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:53.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338306530353366393235616166653638376639643839323938393764 May 10 00:43:53.286000 audit: BPF prog-id=134 op=UNLOAD May 10 00:43:53.286000 audit: BPF prog-id=133 op=UNLOAD May 10 00:43:53.286000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.286000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.286000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.286000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.286000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.286000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.286000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.286000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.286000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.286000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:53.286000 audit: BPF prog-id=135 op=LOAD May 10 00:43:53.286000 audit[3108]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000292e18 items=0 ppid=2410 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:53.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338306530353366393235616166653638376639643839323938393764 May 10 00:43:53.636852 env[1202]: time="2025-05-10T00:43:53.636798057Z" level=info msg="StartContainer for \"c80e053f925aafe687f9d8929897d15075577a518dc6045b2b6edc0be0f1a991\" returns successfully" May 10 00:43:53.649517 sshd[3085]: pam_unix(sshd:session): session closed for user core May 10 00:43:53.648000 audit[3085]: USER_END pid=3085 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:53.649000 audit[3085]: CRED_DISP pid=3085 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:53.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.88:22-10.0.0.1:36524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.652327 systemd[1]: sshd@9-10.0.0.88:22-10.0.0.1:36524.service: Deactivated successfully. May 10 00:43:53.653257 systemd[1]: session-10.scope: Deactivated successfully. May 10 00:43:53.653895 systemd-logind[1191]: Session 10 logged out. Waiting for processes to exit. May 10 00:43:53.655776 systemd-logind[1191]: Removed session 10. May 10 00:43:53.677695 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 00:43:53.677943 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 00:43:53.743522 env[1202]: time="2025-05-10T00:43:53.743437059Z" level=info msg="StopPodSandbox for \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\"" May 10 00:43:53.874981 env[1202]: 2025-05-10 00:43:53.808 [INFO][3178] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" May 10 00:43:53.874981 env[1202]: 2025-05-10 00:43:53.809 [INFO][3178] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" iface="eth0" netns="/var/run/netns/cni-8773859e-57dc-d0b4-6d79-3173e9f63650" May 10 00:43:53.874981 env[1202]: 2025-05-10 00:43:53.809 [INFO][3178] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" iface="eth0" netns="/var/run/netns/cni-8773859e-57dc-d0b4-6d79-3173e9f63650" May 10 00:43:53.874981 env[1202]: 2025-05-10 00:43:53.810 [INFO][3178] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" iface="eth0" netns="/var/run/netns/cni-8773859e-57dc-d0b4-6d79-3173e9f63650" May 10 00:43:53.874981 env[1202]: 2025-05-10 00:43:53.810 [INFO][3178] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" May 10 00:43:53.874981 env[1202]: 2025-05-10 00:43:53.810 [INFO][3178] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" May 10 00:43:53.874981 env[1202]: 2025-05-10 00:43:53.860 [INFO][3196] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" HandleID="k8s-pod-network.24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" Workload="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" May 10 00:43:53.874981 env[1202]: 2025-05-10 00:43:53.861 [INFO][3196] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:43:53.874981 env[1202]: 2025-05-10 00:43:53.861 [INFO][3196] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:43:53.874981 env[1202]: 2025-05-10 00:43:53.869 [WARNING][3196] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" HandleID="k8s-pod-network.24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" Workload="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" May 10 00:43:53.874981 env[1202]: 2025-05-10 00:43:53.869 [INFO][3196] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" HandleID="k8s-pod-network.24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" Workload="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" May 10 00:43:53.874981 env[1202]: 2025-05-10 00:43:53.871 [INFO][3196] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:43:53.874981 env[1202]: 2025-05-10 00:43:53.873 [INFO][3178] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" May 10 00:43:53.875655 env[1202]: time="2025-05-10T00:43:53.875150236Z" level=info msg="TearDown network for sandbox \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\" successfully" May 10 00:43:53.875655 env[1202]: time="2025-05-10T00:43:53.875191343Z" level=info msg="StopPodSandbox for \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\" returns successfully" May 10 00:43:53.875722 kubelet[1947]: E0510 00:43:53.875677 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:53.876214 env[1202]: time="2025-05-10T00:43:53.876154704Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-bvxzp,Uid:d9cc7394-13d8-4c39-a526-a2a634d11caf,Namespace:kube-system,Attempt:1,}" May 10 00:43:53.986918 kubelet[1947]: E0510 00:43:53.986470 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:54.154108 systemd[1]: run-netns-cni\x2d8773859e\x2d57dc\x2dd0b4\x2d6d79\x2d3173e9f63650.mount: Deactivated successfully. May 10 00:43:54.263186 systemd-networkd[1030]: calieef2269faec: Link UP May 10 00:43:54.265847 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:43:54.265916 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calieef2269faec: link becomes ready May 10 00:43:54.266013 systemd-networkd[1030]: calieef2269faec: Gained carrier May 10 00:43:54.277032 kubelet[1947]: I0510 00:43:54.276929 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-nnvm8" podStartSLOduration=1.6486834799999999 podStartE2EDuration="29.276892333s" podCreationTimestamp="2025-05-10 00:43:25 +0000 UTC" firstStartedPulling="2025-05-10 00:43:25.51935053 +0000 UTC m=+12.852005988" lastFinishedPulling="2025-05-10 00:43:53.147559383 +0000 UTC m=+40.480214841" observedRunningTime="2025-05-10 00:43:54.061764813 +0000 UTC m=+41.394420271" watchObservedRunningTime="2025-05-10 00:43:54.276892333 +0000 UTC m=+41.609547821" May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.173 [INFO][3220] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.182 [INFO][3220] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0 coredns-668d6bf9bc- kube-system d9cc7394-13d8-4c39-a526-a2a634d11caf 826 0 2025-05-10 00:43:18 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-bvxzp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calieef2269faec [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" Namespace="kube-system" Pod="coredns-668d6bf9bc-bvxzp" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--bvxzp-" May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.182 [INFO][3220] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" Namespace="kube-system" Pod="coredns-668d6bf9bc-bvxzp" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.213 [INFO][3246] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" HandleID="k8s-pod-network.deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" Workload="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.222 [INFO][3246] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" HandleID="k8s-pod-network.deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" Workload="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000392c90), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-bvxzp", "timestamp":"2025-05-10 00:43:54.213004203 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.222 [INFO][3246] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.222 [INFO][3246] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.222 [INFO][3246] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.226 [INFO][3246] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" host="localhost" May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.231 [INFO][3246] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.236 [INFO][3246] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.238 [INFO][3246] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.240 [INFO][3246] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.240 [INFO][3246] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" host="localhost" May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.241 [INFO][3246] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.245 [INFO][3246] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" host="localhost" May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.253 [INFO][3246] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" host="localhost" May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.253 [INFO][3246] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" host="localhost" May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.253 [INFO][3246] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:43:54.280146 env[1202]: 2025-05-10 00:43:54.253 [INFO][3246] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" HandleID="k8s-pod-network.deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" Workload="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" May 10 00:43:54.281280 env[1202]: 2025-05-10 00:43:54.255 [INFO][3220] cni-plugin/k8s.go 386: Populated endpoint ContainerID="deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" Namespace="kube-system" Pod="coredns-668d6bf9bc-bvxzp" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"d9cc7394-13d8-4c39-a526-a2a634d11caf", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-bvxzp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieef2269faec", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:43:54.281280 env[1202]: 2025-05-10 00:43:54.255 [INFO][3220] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" Namespace="kube-system" Pod="coredns-668d6bf9bc-bvxzp" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" May 10 00:43:54.281280 env[1202]: 2025-05-10 00:43:54.255 [INFO][3220] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calieef2269faec ContainerID="deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" Namespace="kube-system" Pod="coredns-668d6bf9bc-bvxzp" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" May 10 00:43:54.281280 env[1202]: 2025-05-10 00:43:54.265 [INFO][3220] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" Namespace="kube-system" Pod="coredns-668d6bf9bc-bvxzp" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" May 10 00:43:54.281280 env[1202]: 2025-05-10 00:43:54.266 [INFO][3220] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" Namespace="kube-system" Pod="coredns-668d6bf9bc-bvxzp" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"d9cc7394-13d8-4c39-a526-a2a634d11caf", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc", Pod:"coredns-668d6bf9bc-bvxzp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieef2269faec", MAC:"b2:ce:14:3a:e6:59", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:43:54.281280 env[1202]: 2025-05-10 00:43:54.277 [INFO][3220] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc" Namespace="kube-system" Pod="coredns-668d6bf9bc-bvxzp" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" May 10 00:43:54.292863 env[1202]: time="2025-05-10T00:43:54.292785499Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:43:54.292863 env[1202]: time="2025-05-10T00:43:54.292820594Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:43:54.292863 env[1202]: time="2025-05-10T00:43:54.292830323Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:43:54.293091 env[1202]: time="2025-05-10T00:43:54.292943736Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc pid=3280 runtime=io.containerd.runc.v2 May 10 00:43:54.309235 systemd[1]: Started cri-containerd-deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc.scope. May 10 00:43:54.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.317000 audit: BPF prog-id=136 op=LOAD May 10 00:43:54.318000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3280 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:54.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465623535333534336630626262393332303337383634363365383539 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3280 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:54.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465623535333534336630626262393332303337383634363365383539 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit: BPF prog-id=137 op=LOAD May 10 00:43:54.318000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000bd4c0 items=0 ppid=3280 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:54.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465623535333534336630626262393332303337383634363365383539 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit: BPF prog-id=138 op=LOAD May 10 00:43:54.318000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000bd508 items=0 ppid=3280 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:54.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465623535333534336630626262393332303337383634363365383539 May 10 00:43:54.318000 audit: BPF prog-id=138 op=UNLOAD May 10 00:43:54.318000 audit: BPF prog-id=137 op=UNLOAD May 10 00:43:54.318000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.318000 audit: BPF prog-id=139 op=LOAD May 10 00:43:54.318000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000bd918 items=0 ppid=3280 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:54.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465623535333534336630626262393332303337383634363365383539 May 10 00:43:54.320912 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:43:54.347297 env[1202]: time="2025-05-10T00:43:54.347237265Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-bvxzp,Uid:d9cc7394-13d8-4c39-a526-a2a634d11caf,Namespace:kube-system,Attempt:1,} returns sandbox id \"deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc\"" May 10 00:43:54.348196 kubelet[1947]: E0510 00:43:54.347991 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:54.350076 env[1202]: time="2025-05-10T00:43:54.350032227Z" level=info msg="CreateContainer within sandbox \"deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:43:54.372221 env[1202]: time="2025-05-10T00:43:54.372154169Z" level=info msg="CreateContainer within sandbox \"deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e8b56bbb0be475de5b91910543abc0e352327e94d7ca2dbf4c5b27bb5cd0309f\"" May 10 00:43:54.372784 env[1202]: time="2025-05-10T00:43:54.372762803Z" level=info msg="StartContainer for \"e8b56bbb0be475de5b91910543abc0e352327e94d7ca2dbf4c5b27bb5cd0309f\"" May 10 00:43:54.387382 systemd[1]: Started cri-containerd-e8b56bbb0be475de5b91910543abc0e352327e94d7ca2dbf4c5b27bb5cd0309f.scope. May 10 00:43:54.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.406000 audit: BPF prog-id=140 op=LOAD May 10 00:43:54.407000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3280 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:54.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538623536626262306265343735646535623931393130353433616263 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3280 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:54.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538623536626262306265343735646535623931393130353433616263 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit: BPF prog-id=141 op=LOAD May 10 00:43:54.407000 audit[3321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032ca70 items=0 ppid=3280 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:54.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538623536626262306265343735646535623931393130353433616263 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit: BPF prog-id=142 op=LOAD May 10 00:43:54.407000 audit[3321]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032cab8 items=0 ppid=3280 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:54.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538623536626262306265343735646535623931393130353433616263 May 10 00:43:54.407000 audit: BPF prog-id=142 op=UNLOAD May 10 00:43:54.407000 audit: BPF prog-id=141 op=UNLOAD May 10 00:43:54.407000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:54.407000 audit: BPF prog-id=143 op=LOAD May 10 00:43:54.407000 audit[3321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032cec8 items=0 ppid=3280 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:54.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538623536626262306265343735646535623931393130353433616263 May 10 00:43:54.440978 env[1202]: time="2025-05-10T00:43:54.440901350Z" level=info msg="StartContainer for \"e8b56bbb0be475de5b91910543abc0e352327e94d7ca2dbf4c5b27bb5cd0309f\" returns successfully" May 10 00:43:54.569000 audit[3332]: AVC avc: denied { getattr } for pid=3332 comm="coredns" path="cgroup:[4026532635]" dev="nsfs" ino=4026532635 scontext=system_u:system_r:svirt_lxc_net_t:s0:c356,c636 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 10 00:43:54.569000 audit[3332]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a9a8 a2=c0005d4c68 a3=0 items=0 ppid=3280 pid=3332 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c356,c636 key=(null) May 10 00:43:54.569000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 10 00:43:54.742850 env[1202]: time="2025-05-10T00:43:54.742785873Z" level=info msg="StopPodSandbox for \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\"" May 10 00:43:54.837246 env[1202]: 2025-05-10 00:43:54.791 [INFO][3370] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" May 10 00:43:54.837246 env[1202]: 2025-05-10 00:43:54.791 [INFO][3370] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" iface="eth0" netns="/var/run/netns/cni-9c6ed2d1-ec94-f4d4-7448-86764639ac07" May 10 00:43:54.837246 env[1202]: 2025-05-10 00:43:54.792 [INFO][3370] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" iface="eth0" netns="/var/run/netns/cni-9c6ed2d1-ec94-f4d4-7448-86764639ac07" May 10 00:43:54.837246 env[1202]: 2025-05-10 00:43:54.792 [INFO][3370] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" iface="eth0" netns="/var/run/netns/cni-9c6ed2d1-ec94-f4d4-7448-86764639ac07" May 10 00:43:54.837246 env[1202]: 2025-05-10 00:43:54.792 [INFO][3370] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" May 10 00:43:54.837246 env[1202]: 2025-05-10 00:43:54.792 [INFO][3370] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" May 10 00:43:54.837246 env[1202]: 2025-05-10 00:43:54.818 [INFO][3380] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" HandleID="k8s-pod-network.bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" Workload="localhost-k8s-csi--node--driver--kzprd-eth0" May 10 00:43:54.837246 env[1202]: 2025-05-10 00:43:54.818 [INFO][3380] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:43:54.837246 env[1202]: 2025-05-10 00:43:54.818 [INFO][3380] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:43:54.837246 env[1202]: 2025-05-10 00:43:54.830 [WARNING][3380] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" HandleID="k8s-pod-network.bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" Workload="localhost-k8s-csi--node--driver--kzprd-eth0" May 10 00:43:54.837246 env[1202]: 2025-05-10 00:43:54.830 [INFO][3380] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" HandleID="k8s-pod-network.bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" Workload="localhost-k8s-csi--node--driver--kzprd-eth0" May 10 00:43:54.837246 env[1202]: 2025-05-10 00:43:54.832 [INFO][3380] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:43:54.837246 env[1202]: 2025-05-10 00:43:54.835 [INFO][3370] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" May 10 00:43:54.837917 env[1202]: time="2025-05-10T00:43:54.837324069Z" level=info msg="TearDown network for sandbox \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\" successfully" May 10 00:43:54.837917 env[1202]: time="2025-05-10T00:43:54.837372661Z" level=info msg="StopPodSandbox for \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\" returns successfully" May 10 00:43:54.838425 env[1202]: time="2025-05-10T00:43:54.838379613Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kzprd,Uid:b7f06332-7253-4fd1-8fe2-c3b993295a9a,Namespace:calico-system,Attempt:1,}" May 10 00:43:54.968022 systemd-networkd[1030]: cali18773b98bdb: Link UP May 10 00:43:54.969819 systemd-networkd[1030]: cali18773b98bdb: Gained carrier May 10 00:43:54.970686 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali18773b98bdb: link becomes ready May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.872 [INFO][3388] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.884 [INFO][3388] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--kzprd-eth0 csi-node-driver- calico-system b7f06332-7253-4fd1-8fe2-c3b993295a9a 849 0 2025-05-10 00:43:25 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-kzprd eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali18773b98bdb [] []}} ContainerID="a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" Namespace="calico-system" Pod="csi-node-driver-kzprd" WorkloadEndpoint="localhost-k8s-csi--node--driver--kzprd-" May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.884 [INFO][3388] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" Namespace="calico-system" Pod="csi-node-driver-kzprd" WorkloadEndpoint="localhost-k8s-csi--node--driver--kzprd-eth0" May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.920 [INFO][3402] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" HandleID="k8s-pod-network.a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" Workload="localhost-k8s-csi--node--driver--kzprd-eth0" May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.930 [INFO][3402] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" HandleID="k8s-pod-network.a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" Workload="localhost-k8s-csi--node--driver--kzprd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d3b0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-kzprd", "timestamp":"2025-05-10 00:43:54.920672238 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.930 [INFO][3402] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.930 [INFO][3402] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.930 [INFO][3402] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.932 [INFO][3402] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" host="localhost" May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.937 [INFO][3402] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.945 [INFO][3402] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.947 [INFO][3402] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.949 [INFO][3402] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.949 [INFO][3402] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" host="localhost" May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.952 [INFO][3402] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.959 [INFO][3402] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" host="localhost" May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.964 [INFO][3402] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" host="localhost" May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.964 [INFO][3402] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" host="localhost" May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.964 [INFO][3402] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:43:54.981138 env[1202]: 2025-05-10 00:43:54.964 [INFO][3402] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" HandleID="k8s-pod-network.a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" Workload="localhost-k8s-csi--node--driver--kzprd-eth0" May 10 00:43:54.982201 env[1202]: 2025-05-10 00:43:54.966 [INFO][3388] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" Namespace="calico-system" Pod="csi-node-driver-kzprd" WorkloadEndpoint="localhost-k8s-csi--node--driver--kzprd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--kzprd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b7f06332-7253-4fd1-8fe2-c3b993295a9a", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-kzprd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali18773b98bdb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:43:54.982201 env[1202]: 2025-05-10 00:43:54.966 [INFO][3388] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" Namespace="calico-system" Pod="csi-node-driver-kzprd" WorkloadEndpoint="localhost-k8s-csi--node--driver--kzprd-eth0" May 10 00:43:54.982201 env[1202]: 2025-05-10 00:43:54.966 [INFO][3388] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali18773b98bdb ContainerID="a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" Namespace="calico-system" Pod="csi-node-driver-kzprd" WorkloadEndpoint="localhost-k8s-csi--node--driver--kzprd-eth0" May 10 00:43:54.982201 env[1202]: 2025-05-10 00:43:54.969 [INFO][3388] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" Namespace="calico-system" Pod="csi-node-driver-kzprd" WorkloadEndpoint="localhost-k8s-csi--node--driver--kzprd-eth0" May 10 00:43:54.982201 env[1202]: 2025-05-10 00:43:54.969 [INFO][3388] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" Namespace="calico-system" Pod="csi-node-driver-kzprd" WorkloadEndpoint="localhost-k8s-csi--node--driver--kzprd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--kzprd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b7f06332-7253-4fd1-8fe2-c3b993295a9a", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de", Pod:"csi-node-driver-kzprd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali18773b98bdb", MAC:"e2:c9:af:6d:3b:04", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:43:54.982201 env[1202]: 2025-05-10 00:43:54.979 [INFO][3388] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de" Namespace="calico-system" Pod="csi-node-driver-kzprd" WorkloadEndpoint="localhost-k8s-csi--node--driver--kzprd-eth0" May 10 00:43:54.990786 kubelet[1947]: E0510 00:43:54.990754 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:54.991538 kubelet[1947]: E0510 00:43:54.990860 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:55.005620 env[1202]: time="2025-05-10T00:43:55.005423963Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:43:55.005620 env[1202]: time="2025-05-10T00:43:55.005584244Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:43:55.005956 env[1202]: time="2025-05-10T00:43:55.005627154Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:43:55.005956 env[1202]: time="2025-05-10T00:43:55.005913683Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de pid=3433 runtime=io.containerd.runc.v2 May 10 00:43:55.012000 audit[3449]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=3449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:55.012000 audit[3449]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffda8232b10 a2=0 a3=7ffda8232afc items=0 ppid=2096 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.012000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:55.020000 audit[3449]: NETFILTER_CFG table=nat:98 family=2 entries=14 op=nft_register_rule pid=3449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:55.020000 audit[3449]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffda8232b10 a2=0 a3=0 items=0 ppid=2096 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.020000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:55.022966 systemd[1]: Started cri-containerd-a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de.scope. May 10 00:43:55.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.039000 audit: BPF prog-id=144 op=LOAD May 10 00:43:55.041000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.041000 audit[3448]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3433 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663835343136633736663735303962353134323833333735333230 May 10 00:43:55.041000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.041000 audit[3448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3433 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663835343136633736663735303962353134323833333735333230 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit: BPF prog-id=145 op=LOAD May 10 00:43:55.042000 audit[3448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002495a0 items=0 ppid=3433 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663835343136633736663735303962353134323833333735333230 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.042000 audit: BPF prog-id=146 op=LOAD May 10 00:43:55.042000 audit[3448]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002495e8 items=0 ppid=3433 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663835343136633736663735303962353134323833333735333230 May 10 00:43:55.043000 audit: BPF prog-id=146 op=UNLOAD May 10 00:43:55.043000 audit: BPF prog-id=145 op=UNLOAD May 10 00:43:55.044000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.044000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.044000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.044000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.044000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.044000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.044000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.044000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.044000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.044000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.044000 audit: BPF prog-id=147 op=LOAD May 10 00:43:55.044000 audit[3448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002499f8 items=0 ppid=3433 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663835343136633736663735303962353134323833333735333230 May 10 00:43:55.047298 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:43:55.062411 env[1202]: time="2025-05-10T00:43:55.061750350Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kzprd,Uid:b7f06332-7253-4fd1-8fe2-c3b993295a9a,Namespace:calico-system,Attempt:1,} returns sandbox id \"a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de\"" May 10 00:43:55.063137 env[1202]: time="2025-05-10T00:43:55.063096489Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 00:43:55.155741 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3189268895.mount: Deactivated successfully. May 10 00:43:55.155832 systemd[1]: run-netns-cni\x2d9c6ed2d1\x2dec94\x2df4d4\x2d7448\x2d86764639ac07.mount: Deactivated successfully. May 10 00:43:55.215000 audit[3523]: AVC avc: denied { write } for pid=3523 comm="tee" name="fd" dev="proc" ino=24185 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:43:55.215000 audit[3523]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb9b9da30 a2=241 a3=1b6 items=1 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.215000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:43:55.215000 audit: PATH item=0 name="/dev/fd/63" inode=24182 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:55.215000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:43:55.219000 audit[3528]: AVC avc: denied { write } for pid=3528 comm="tee" name="fd" dev="proc" ino=24192 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:43:55.219000 audit[3528]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9cf0da1e a2=241 a3=1b6 items=1 ppid=3503 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.219000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:43:55.219000 audit: PATH item=0 name="/dev/fd/63" inode=24187 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:55.219000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:43:55.222000 audit[3541]: AVC avc: denied { write } for pid=3541 comm="tee" name="fd" dev="proc" ino=24197 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:43:55.222000 audit[3541]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd38e2a2e a2=241 a3=1b6 items=1 ppid=3495 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.222000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:43:55.222000 audit: PATH item=0 name="/dev/fd/63" inode=24194 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:55.222000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:43:55.224000 audit[3558]: AVC avc: denied { write } for pid=3558 comm="tee" name="fd" dev="proc" ino=26879 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:43:55.224000 audit[3558]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcfa46ba2f a2=241 a3=1b6 items=1 ppid=3496 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.224000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:43:55.224000 audit: PATH item=0 name="/dev/fd/63" inode=25216 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:55.224000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:43:55.227000 audit[3539]: AVC avc: denied { write } for pid=3539 comm="tee" name="fd" dev="proc" ino=24202 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:43:55.227000 audit[3539]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcbcd5ca1f a2=241 a3=1b6 items=1 ppid=3506 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.227000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:43:55.227000 audit: PATH item=0 name="/dev/fd/63" inode=25981 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:55.227000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:43:55.229000 audit[3561]: AVC avc: denied { write } for pid=3561 comm="tee" name="fd" dev="proc" ino=25986 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:43:55.229000 audit[3561]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2441da2e a2=241 a3=1b6 items=1 ppid=3510 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.229000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:43:55.229000 audit: PATH item=0 name="/dev/fd/63" inode=25982 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:55.229000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:43:55.257000 audit[3574]: AVC avc: denied { write } for pid=3574 comm="tee" name="fd" dev="proc" ino=25221 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:43:55.257000 audit[3574]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffde20da2e a2=241 a3=1b6 items=1 ppid=3500 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.257000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:43:55.257000 audit: PATH item=0 name="/dev/fd/63" inode=26884 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:55.257000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:43:55.361000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.361000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.361000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.361000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.361000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.361000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.361000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.361000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.361000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.361000 audit: BPF prog-id=148 op=LOAD May 10 00:43:55.361000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb9c050b0 a2=98 a3=3 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.361000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.363000 audit: BPF prog-id=148 op=UNLOAD May 10 00:43:55.363000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.363000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.363000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.363000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.363000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.363000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.363000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.363000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.363000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.363000 audit: BPF prog-id=149 op=LOAD May 10 00:43:55.363000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb9c04e90 a2=74 a3=540051 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.363000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.364000 audit: BPF prog-id=149 op=UNLOAD May 10 00:43:55.364000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.364000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.364000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.364000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.364000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.364000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.364000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.364000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.364000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.364000 audit: BPF prog-id=150 op=LOAD May 10 00:43:55.364000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb9c04ec0 a2=94 a3=2 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.364000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.365000 audit: BPF prog-id=150 op=UNLOAD May 10 00:43:55.505000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.505000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.505000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.505000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.505000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.505000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.505000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.505000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.505000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.505000 audit: BPF prog-id=151 op=LOAD May 10 00:43:55.505000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb9c04d80 a2=40 a3=1 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.505000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.505000 audit: BPF prog-id=151 op=UNLOAD May 10 00:43:55.505000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.505000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffeb9c04e50 a2=50 a3=7ffeb9c04f30 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.505000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.515000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb9c04d90 a2=28 a3=0 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.515000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb9c04dc0 a2=28 a3=0 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.515000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb9c04cd0 a2=28 a3=0 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.515000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb9c04de0 a2=28 a3=0 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.515000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb9c04dc0 a2=28 a3=0 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.515000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb9c04db0 a2=28 a3=0 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.515000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb9c04de0 a2=28 a3=0 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.515000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb9c04dc0 a2=28 a3=0 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.515000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb9c04de0 a2=28 a3=0 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.515000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb9c04db0 a2=28 a3=0 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.515000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb9c04e20 a2=28 a3=0 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.515000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb9c04bd0 a2=50 a3=1 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.515000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.515000 audit: BPF prog-id=152 op=LOAD May 10 00:43:55.515000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeb9c04bd0 a2=94 a3=5 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.516000 audit: BPF prog-id=152 op=UNLOAD May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb9c04c80 a2=50 a3=1 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.516000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffeb9c04da0 a2=4 a3=38 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.516000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { confidentiality } for pid=3612 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:43:55.516000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb9c04df0 a2=94 a3=6 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.516000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { confidentiality } for pid=3612 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:43:55.516000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb9c045a0 a2=94 a3=83 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.516000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.516000 audit[3612]: AVC avc: denied { confidentiality } for pid=3612 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:43:55.516000 audit[3612]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb9c045a0 a2=94 a3=83 items=0 ppid=3498 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:43:55.524000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit: BPF prog-id=153 op=LOAD May 10 00:43:55.524000 audit[3623]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc9aa97890 a2=98 a3=1999999999999999 items=0 ppid=3498 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.524000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:43:55.524000 audit: BPF prog-id=153 op=UNLOAD May 10 00:43:55.524000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit: BPF prog-id=154 op=LOAD May 10 00:43:55.524000 audit[3623]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc9aa97770 a2=74 a3=ffff items=0 ppid=3498 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.524000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:43:55.524000 audit: BPF prog-id=154 op=UNLOAD May 10 00:43:55.524000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.524000 audit: BPF prog-id=155 op=LOAD May 10 00:43:55.524000 audit[3623]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc9aa977b0 a2=40 a3=7ffc9aa97990 items=0 ppid=3498 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.524000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:43:55.524000 audit: BPF prog-id=155 op=UNLOAD May 10 00:43:55.594673 systemd-networkd[1030]: vxlan.calico: Link UP May 10 00:43:55.594681 systemd-networkd[1030]: vxlan.calico: Gained carrier May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit: BPF prog-id=156 op=LOAD May 10 00:43:55.600000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb68052d0 a2=98 a3=ffffffff items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.600000 audit: BPF prog-id=156 op=UNLOAD May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit: BPF prog-id=157 op=LOAD May 10 00:43:55.600000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb68050e0 a2=74 a3=540051 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.600000 audit: BPF prog-id=157 op=UNLOAD May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit: BPF prog-id=158 op=LOAD May 10 00:43:55.600000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb6805110 a2=94 a3=2 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.600000 audit: BPF prog-id=158 op=UNLOAD May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb6804fe0 a2=28 a3=0 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb6805010 a2=28 a3=0 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb6804f20 a2=28 a3=0 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb6805030 a2=28 a3=0 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb6805010 a2=28 a3=0 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.600000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.600000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb6805000 a2=28 a3=0 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb6805030 a2=28 a3=0 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.602000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb6805010 a2=28 a3=0 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.602000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb6805030 a2=28 a3=0 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.602000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb6805000 a2=28 a3=0 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.602000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb6805070 a2=28 a3=0 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.602000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit: BPF prog-id=159 op=LOAD May 10 00:43:55.602000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdb6804ee0 a2=40 a3=0 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.602000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.602000 audit: BPF prog-id=159 op=UNLOAD May 10 00:43:55.602000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdb6804ed0 a2=50 a3=2800 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.602000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffdb6804ed0 a2=50 a3=2800 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.602000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.602000 audit: BPF prog-id=160 op=LOAD May 10 00:43:55.602000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdb68046f0 a2=94 a3=2 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.602000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.603000 audit: BPF prog-id=160 op=UNLOAD May 10 00:43:55.603000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.603000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.603000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.603000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.603000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.603000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.603000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.603000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.603000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.603000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.603000 audit: BPF prog-id=161 op=LOAD May 10 00:43:55.603000 audit[3648]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdb68047f0 a2=94 a3=30 items=0 ppid=3498 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.603000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit: BPF prog-id=162 op=LOAD May 10 00:43:55.610000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc3eb10100 a2=98 a3=0 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.610000 audit: BPF prog-id=162 op=UNLOAD May 10 00:43:55.610000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit: BPF prog-id=163 op=LOAD May 10 00:43:55.610000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc3eb0fee0 a2=74 a3=540051 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.610000 audit: BPF prog-id=163 op=UNLOAD May 10 00:43:55.610000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.610000 audit: BPF prog-id=164 op=LOAD May 10 00:43:55.610000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc3eb0ff10 a2=94 a3=2 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.610000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.610000 audit: BPF prog-id=164 op=UNLOAD May 10 00:43:55.739000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.739000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.739000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.739000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.739000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.739000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.739000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.739000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.739000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.739000 audit: BPF prog-id=165 op=LOAD May 10 00:43:55.739000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc3eb0fdd0 a2=40 a3=1 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.739000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.739000 audit: BPF prog-id=165 op=UNLOAD May 10 00:43:55.739000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.739000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc3eb0fea0 a2=50 a3=7ffc3eb0ff80 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.739000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.742613 env[1202]: time="2025-05-10T00:43:55.742571224Z" level=info msg="StopPodSandbox for \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\"" May 10 00:43:55.743068 env[1202]: time="2025-05-10T00:43:55.743031299Z" level=info msg="StopPodSandbox for \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\"" May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3eb0fde0 a2=28 a3=0 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3eb0fe10 a2=28 a3=0 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3eb0fd20 a2=28 a3=0 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3eb0fe30 a2=28 a3=0 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3eb0fe10 a2=28 a3=0 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3eb0fe00 a2=28 a3=0 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3eb0fe30 a2=28 a3=0 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3eb0fe10 a2=28 a3=0 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3eb0fe30 a2=28 a3=0 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3eb0fe00 a2=28 a3=0 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3eb0fe70 a2=28 a3=0 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc3eb0fc20 a2=50 a3=1 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit: BPF prog-id=166 op=LOAD May 10 00:43:55.748000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc3eb0fc20 a2=94 a3=5 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.748000 audit: BPF prog-id=166 op=UNLOAD May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc3eb0fcd0 a2=50 a3=1 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc3eb0fdf0 a2=4 a3=38 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { confidentiality } for pid=3652 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:43:55.748000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc3eb0fe40 a2=94 a3=6 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.748000 audit[3652]: AVC avc: denied { confidentiality } for pid=3652 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:43:55.748000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc3eb0f5f0 a2=94 a3=83 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.749000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.749000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.749000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.749000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.749000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.749000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.749000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.749000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.749000 audit[3652]: AVC avc: denied { perfmon } for pid=3652 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.749000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.749000 audit[3652]: AVC avc: denied { confidentiality } for pid=3652 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:43:55.749000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc3eb0f5f0 a2=94 a3=83 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.749000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.749000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.749000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc3eb11030 a2=10 a3=208 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.749000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.749000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.749000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc3eb10ed0 a2=10 a3=3 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.749000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.749000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.749000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc3eb10e70 a2=10 a3=3 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.749000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.749000 audit[3652]: AVC avc: denied { bpf } for pid=3652 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:55.749000 audit[3652]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc3eb10e70 a2=10 a3=7 items=0 ppid=3498 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.749000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:43:55.758000 audit: BPF prog-id=161 op=UNLOAD May 10 00:43:55.758000 audit[3692]: SYSCALL arch=c000003e syscall=3 success=yes exit=0 a0=3 a1=0 a2=0 a3=0 items=0 ppid=1202 pid=3692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="calico" exe="/opt/cni/bin/calico" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.758000 audit: PROCTITLE proctitle="/opt/cni/bin/calico" May 10 00:43:55.815000 audit[3728]: NETFILTER_CFG table=mangle:99 family=2 entries=16 op=nft_register_chain pid=3728 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:43:55.815000 audit[3728]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc12bfc280 a2=0 a3=7ffc12bfc26c items=0 ppid=3498 pid=3728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.815000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:43:55.823000 audit[3729]: NETFILTER_CFG table=nat:100 family=2 entries=15 op=nft_register_chain pid=3729 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:43:55.823000 audit[3729]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffebbb0f9c0 a2=0 a3=7ffebbb0f9ac items=0 ppid=3498 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.823000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:43:55.825000 audit[3732]: NETFILTER_CFG table=filter:101 family=2 entries=99 op=nft_register_chain pid=3732 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:43:55.825000 audit[3732]: SYSCALL arch=c000003e syscall=46 success=yes exit=53840 a0=3 a1=7ffdda8f1760 a2=0 a3=7ffdda8f174c items=0 ppid=3498 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.825000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:43:55.827000 audit[3727]: NETFILTER_CFG table=raw:102 family=2 entries=21 op=nft_register_chain pid=3727 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:43:55.827000 audit[3727]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffdbbe1f5f0 a2=0 a3=7ffdbbe1f5dc items=0 ppid=3498 pid=3727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:55.827000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:43:55.993423 kubelet[1947]: E0510 00:43:55.993377 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:56.012801 kubelet[1947]: I0510 00:43:56.012394 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-bvxzp" podStartSLOduration=38.012370702 podStartE2EDuration="38.012370702s" podCreationTimestamp="2025-05-10 00:43:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:43:55.003472816 +0000 UTC m=+42.336128274" watchObservedRunningTime="2025-05-10 00:43:56.012370702 +0000 UTC m=+43.345026160" May 10 00:43:56.154880 systemd-networkd[1030]: cali18773b98bdb: Gained IPv6LL May 10 00:43:56.282728 systemd-networkd[1030]: calieef2269faec: Gained IPv6LL May 10 00:43:56.476580 env[1202]: 2025-05-10 00:43:56.012 [INFO][3692] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" May 10 00:43:56.476580 env[1202]: 2025-05-10 00:43:56.012 [INFO][3692] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" iface="eth0" netns="/var/run/netns/cni-fbf8ba7b-0edc-9aa0-4fbe-08b888638d9e" May 10 00:43:56.476580 env[1202]: 2025-05-10 00:43:56.013 [INFO][3692] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" iface="eth0" netns="/var/run/netns/cni-fbf8ba7b-0edc-9aa0-4fbe-08b888638d9e" May 10 00:43:56.476580 env[1202]: 2025-05-10 00:43:56.013 [INFO][3692] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" iface="eth0" netns="/var/run/netns/cni-fbf8ba7b-0edc-9aa0-4fbe-08b888638d9e" May 10 00:43:56.476580 env[1202]: 2025-05-10 00:43:56.013 [INFO][3692] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" May 10 00:43:56.476580 env[1202]: 2025-05-10 00:43:56.013 [INFO][3692] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" May 10 00:43:56.476580 env[1202]: 2025-05-10 00:43:56.036 [INFO][3738] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" HandleID="k8s-pod-network.2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" Workload="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" May 10 00:43:56.476580 env[1202]: 2025-05-10 00:43:56.036 [INFO][3738] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:43:56.476580 env[1202]: 2025-05-10 00:43:56.036 [INFO][3738] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:43:56.476580 env[1202]: 2025-05-10 00:43:56.412 [WARNING][3738] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" HandleID="k8s-pod-network.2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" Workload="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" May 10 00:43:56.476580 env[1202]: 2025-05-10 00:43:56.412 [INFO][3738] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" HandleID="k8s-pod-network.2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" Workload="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" May 10 00:43:56.476580 env[1202]: 2025-05-10 00:43:56.472 [INFO][3738] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:43:56.476580 env[1202]: 2025-05-10 00:43:56.474 [INFO][3692] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" May 10 00:43:56.478374 env[1202]: time="2025-05-10T00:43:56.476788203Z" level=info msg="TearDown network for sandbox \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\" successfully" May 10 00:43:56.478374 env[1202]: time="2025-05-10T00:43:56.476832496Z" level=info msg="StopPodSandbox for \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\" returns successfully" May 10 00:43:56.478433 kubelet[1947]: E0510 00:43:56.477212 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:56.478903 env[1202]: time="2025-05-10T00:43:56.478847942Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-tqt8t,Uid:cb7ed29e-de46-4390-9af6-2667bd2e5356,Namespace:kube-system,Attempt:1,}" May 10 00:43:56.481126 systemd[1]: run-netns-cni\x2dfbf8ba7b\x2d0edc\x2d9aa0\x2d4fbe\x2d08b888638d9e.mount: Deactivated successfully. May 10 00:43:56.644384 env[1202]: 2025-05-10 00:43:56.089 [INFO][3693] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" May 10 00:43:56.644384 env[1202]: 2025-05-10 00:43:56.090 [INFO][3693] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" iface="eth0" netns="/var/run/netns/cni-3032f15a-f846-914a-1ec0-287049cc63c4" May 10 00:43:56.644384 env[1202]: 2025-05-10 00:43:56.090 [INFO][3693] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" iface="eth0" netns="/var/run/netns/cni-3032f15a-f846-914a-1ec0-287049cc63c4" May 10 00:43:56.644384 env[1202]: 2025-05-10 00:43:56.090 [INFO][3693] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" iface="eth0" netns="/var/run/netns/cni-3032f15a-f846-914a-1ec0-287049cc63c4" May 10 00:43:56.644384 env[1202]: 2025-05-10 00:43:56.090 [INFO][3693] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" May 10 00:43:56.644384 env[1202]: 2025-05-10 00:43:56.090 [INFO][3693] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" May 10 00:43:56.644384 env[1202]: 2025-05-10 00:43:56.112 [INFO][3746] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" HandleID="k8s-pod-network.e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" Workload="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" May 10 00:43:56.644384 env[1202]: 2025-05-10 00:43:56.112 [INFO][3746] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:43:56.644384 env[1202]: 2025-05-10 00:43:56.472 [INFO][3746] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:43:56.644384 env[1202]: 2025-05-10 00:43:56.620 [WARNING][3746] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" HandleID="k8s-pod-network.e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" Workload="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" May 10 00:43:56.644384 env[1202]: 2025-05-10 00:43:56.621 [INFO][3746] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" HandleID="k8s-pod-network.e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" Workload="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" May 10 00:43:56.644384 env[1202]: 2025-05-10 00:43:56.640 [INFO][3746] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:43:56.644384 env[1202]: 2025-05-10 00:43:56.642 [INFO][3693] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" May 10 00:43:56.644869 env[1202]: time="2025-05-10T00:43:56.644539701Z" level=info msg="TearDown network for sandbox \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\" successfully" May 10 00:43:56.644869 env[1202]: time="2025-05-10T00:43:56.644590988Z" level=info msg="StopPodSandbox for \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\" returns successfully" May 10 00:43:56.645246 env[1202]: time="2025-05-10T00:43:56.645213697Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c5689859f-l879k,Uid:43a0790b-1277-4d8d-9090-56e515ec4483,Namespace:calico-apiserver,Attempt:1,}" May 10 00:43:56.646790 systemd[1]: run-netns-cni\x2d3032f15a\x2df846\x2d914a\x2d1ec0\x2d287049cc63c4.mount: Deactivated successfully. May 10 00:43:56.702000 audit[3756]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=3756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:56.702000 audit[3756]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdc970bc90 a2=0 a3=7ffdc970bc7c items=0 ppid=2096 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:56.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:56.708000 audit[3756]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=3756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:56.708000 audit[3756]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffdc970bc90 a2=0 a3=7ffdc970bc7c items=0 ppid=2096 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:56.708000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:56.858782 systemd-networkd[1030]: vxlan.calico: Gained IPv6LL May 10 00:43:56.995850 kubelet[1947]: E0510 00:43:56.995707 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:57.148100 systemd-networkd[1030]: calif83bd6f6055: Link UP May 10 00:43:57.150935 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:43:57.151029 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif83bd6f6055: link becomes ready May 10 00:43:57.151296 systemd-networkd[1030]: calif83bd6f6055: Gained carrier May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.062 [INFO][3758] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0 coredns-668d6bf9bc- kube-system cb7ed29e-de46-4390-9af6-2667bd2e5356 864 0 2025-05-10 00:43:18 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-tqt8t eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calif83bd6f6055 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" Namespace="kube-system" Pod="coredns-668d6bf9bc-tqt8t" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--tqt8t-" May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.062 [INFO][3758] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" Namespace="kube-system" Pod="coredns-668d6bf9bc-tqt8t" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.099 [INFO][3784] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" HandleID="k8s-pod-network.af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" Workload="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.115 [INFO][3784] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" HandleID="k8s-pod-network.af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" Workload="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033ab60), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-tqt8t", "timestamp":"2025-05-10 00:43:57.099554046 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.115 [INFO][3784] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.115 [INFO][3784] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.115 [INFO][3784] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.116 [INFO][3784] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" host="localhost" May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.120 [INFO][3784] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.124 [INFO][3784] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.126 [INFO][3784] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.128 [INFO][3784] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.128 [INFO][3784] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" host="localhost" May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.129 [INFO][3784] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.135 [INFO][3784] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" host="localhost" May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.142 [INFO][3784] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" host="localhost" May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.142 [INFO][3784] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" host="localhost" May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.142 [INFO][3784] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:43:57.166687 env[1202]: 2025-05-10 00:43:57.142 [INFO][3784] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" HandleID="k8s-pod-network.af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" Workload="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" May 10 00:43:57.167626 env[1202]: 2025-05-10 00:43:57.145 [INFO][3758] cni-plugin/k8s.go 386: Populated endpoint ContainerID="af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" Namespace="kube-system" Pod="coredns-668d6bf9bc-tqt8t" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"cb7ed29e-de46-4390-9af6-2667bd2e5356", ResourceVersion:"864", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-tqt8t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif83bd6f6055", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:43:57.167626 env[1202]: 2025-05-10 00:43:57.145 [INFO][3758] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" Namespace="kube-system" Pod="coredns-668d6bf9bc-tqt8t" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" May 10 00:43:57.167626 env[1202]: 2025-05-10 00:43:57.145 [INFO][3758] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif83bd6f6055 ContainerID="af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" Namespace="kube-system" Pod="coredns-668d6bf9bc-tqt8t" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" May 10 00:43:57.167626 env[1202]: 2025-05-10 00:43:57.151 [INFO][3758] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" Namespace="kube-system" Pod="coredns-668d6bf9bc-tqt8t" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" May 10 00:43:57.167626 env[1202]: 2025-05-10 00:43:57.151 [INFO][3758] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" Namespace="kube-system" Pod="coredns-668d6bf9bc-tqt8t" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"cb7ed29e-de46-4390-9af6-2667bd2e5356", ResourceVersion:"864", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc", Pod:"coredns-668d6bf9bc-tqt8t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif83bd6f6055", MAC:"7a:58:41:7e:27:96", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:43:57.167626 env[1202]: 2025-05-10 00:43:57.164 [INFO][3758] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc" Namespace="kube-system" Pod="coredns-668d6bf9bc-tqt8t" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" May 10 00:43:57.174000 audit[3816]: NETFILTER_CFG table=filter:105 family=2 entries=34 op=nft_register_chain pid=3816 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:43:57.188521 kernel: kauditd_printk_skb: 747 callbacks suppressed May 10 00:43:57.188760 kernel: audit: type=1325 audit(1746837837.174:1195): table=filter:105 family=2 entries=34 op=nft_register_chain pid=3816 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:43:57.188793 kernel: audit: type=1300 audit(1746837837.174:1195): arch=c000003e syscall=46 success=yes exit=18220 a0=3 a1=7fff51a71040 a2=0 a3=7fff51a7102c items=0 ppid=3498 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.188815 kernel: audit: type=1327 audit(1746837837.174:1195): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:43:57.174000 audit[3816]: SYSCALL arch=c000003e syscall=46 success=yes exit=18220 a0=3 a1=7fff51a71040 a2=0 a3=7fff51a7102c items=0 ppid=3498 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.174000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:43:57.189010 env[1202]: time="2025-05-10T00:43:57.180307018Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:43:57.189010 env[1202]: time="2025-05-10T00:43:57.180345931Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:43:57.189010 env[1202]: time="2025-05-10T00:43:57.180356000Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:43:57.189010 env[1202]: time="2025-05-10T00:43:57.180480473Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc pid=3824 runtime=io.containerd.runc.v2 May 10 00:43:57.202329 systemd[1]: Started cri-containerd-af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc.scope. May 10 00:43:57.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.221937 kernel: audit: type=1400 audit(1746837837.212:1196): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.222038 kernel: audit: type=1400 audit(1746837837.212:1197): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.222077 kernel: audit: type=1400 audit(1746837837.212:1198): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.226160 kernel: audit: type=1400 audit(1746837837.212:1199): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.233422 kernel: audit: type=1400 audit(1746837837.212:1200): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.233719 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:43:57.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.237591 kernel: audit: type=1400 audit(1746837837.212:1201): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.216000 audit: BPF prog-id=167 op=LOAD May 10 00:43:57.217000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.217000 audit[3833]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3824 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376561316632313765373061316261663731633732613035666534 May 10 00:43:57.217000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.217000 audit[3833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3824 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376561316632313765373061316261663731633732613035666534 May 10 00:43:57.217000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.242587 kernel: audit: type=1400 audit(1746837837.212:1202): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.217000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.217000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.217000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.217000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.217000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.217000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.217000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.217000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.217000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.217000 audit: BPF prog-id=168 op=LOAD May 10 00:43:57.217000 audit[3833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002fa3a0 items=0 ppid=3824 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376561316632313765373061316261663731633732613035666534 May 10 00:43:57.220000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.220000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.220000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.220000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.220000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.220000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.220000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.220000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.220000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.220000 audit: BPF prog-id=169 op=LOAD May 10 00:43:57.220000 audit[3833]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002fa3e8 items=0 ppid=3824 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376561316632313765373061316261663731633732613035666534 May 10 00:43:57.224000 audit: BPF prog-id=169 op=UNLOAD May 10 00:43:57.224000 audit: BPF prog-id=168 op=UNLOAD May 10 00:43:57.224000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.224000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.224000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.224000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.224000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.224000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.224000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.224000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.224000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.224000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.224000 audit: BPF prog-id=170 op=LOAD May 10 00:43:57.224000 audit[3833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002fa7f8 items=0 ppid=3824 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376561316632313765373061316261663731633732613035666534 May 10 00:43:57.254722 systemd-networkd[1030]: cali4531eda25b3: Link UP May 10 00:43:57.258162 systemd-networkd[1030]: cali4531eda25b3: Gained carrier May 10 00:43:57.258574 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4531eda25b3: link becomes ready May 10 00:43:57.278417 env[1202]: time="2025-05-10T00:43:57.278372944Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-tqt8t,Uid:cb7ed29e-de46-4390-9af6-2667bd2e5356,Namespace:kube-system,Attempt:1,} returns sandbox id \"af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc\"" May 10 00:43:57.279744 kubelet[1947]: E0510 00:43:57.279706 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.071 [INFO][3766] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0 calico-apiserver-7c5689859f- calico-apiserver 43a0790b-1277-4d8d-9090-56e515ec4483 865 0 2025-05-10 00:43:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7c5689859f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7c5689859f-l879k eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali4531eda25b3 [] []}} ContainerID="da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" Namespace="calico-apiserver" Pod="calico-apiserver-7c5689859f-l879k" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5689859f--l879k-" May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.071 [INFO][3766] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" Namespace="calico-apiserver" Pod="calico-apiserver-7c5689859f-l879k" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.107 [INFO][3791] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" HandleID="k8s-pod-network.da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" Workload="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.115 [INFO][3791] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" HandleID="k8s-pod-network.da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" Workload="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000583540), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7c5689859f-l879k", "timestamp":"2025-05-10 00:43:57.107830775 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.115 [INFO][3791] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.142 [INFO][3791] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.142 [INFO][3791] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.218 [INFO][3791] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" host="localhost" May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.223 [INFO][3791] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.229 [INFO][3791] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.230 [INFO][3791] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.233 [INFO][3791] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.233 [INFO][3791] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" host="localhost" May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.236 [INFO][3791] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3 May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.241 [INFO][3791] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" host="localhost" May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.249 [INFO][3791] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" host="localhost" May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.249 [INFO][3791] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" host="localhost" May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.249 [INFO][3791] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:43:57.282791 env[1202]: 2025-05-10 00:43:57.249 [INFO][3791] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" HandleID="k8s-pod-network.da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" Workload="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" May 10 00:43:57.283370 env[1202]: 2025-05-10 00:43:57.252 [INFO][3766] cni-plugin/k8s.go 386: Populated endpoint ContainerID="da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" Namespace="calico-apiserver" Pod="calico-apiserver-7c5689859f-l879k" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0", GenerateName:"calico-apiserver-7c5689859f-", Namespace:"calico-apiserver", SelfLink:"", UID:"43a0790b-1277-4d8d-9090-56e515ec4483", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c5689859f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7c5689859f-l879k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4531eda25b3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:43:57.283370 env[1202]: 2025-05-10 00:43:57.252 [INFO][3766] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" Namespace="calico-apiserver" Pod="calico-apiserver-7c5689859f-l879k" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" May 10 00:43:57.283370 env[1202]: 2025-05-10 00:43:57.252 [INFO][3766] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4531eda25b3 ContainerID="da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" Namespace="calico-apiserver" Pod="calico-apiserver-7c5689859f-l879k" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" May 10 00:43:57.283370 env[1202]: 2025-05-10 00:43:57.255 [INFO][3766] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" Namespace="calico-apiserver" Pod="calico-apiserver-7c5689859f-l879k" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" May 10 00:43:57.283370 env[1202]: 2025-05-10 00:43:57.258 [INFO][3766] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" Namespace="calico-apiserver" Pod="calico-apiserver-7c5689859f-l879k" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0", GenerateName:"calico-apiserver-7c5689859f-", Namespace:"calico-apiserver", SelfLink:"", UID:"43a0790b-1277-4d8d-9090-56e515ec4483", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c5689859f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3", Pod:"calico-apiserver-7c5689859f-l879k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4531eda25b3", MAC:"d6:3a:90:6f:67:c5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:43:57.283370 env[1202]: 2025-05-10 00:43:57.270 [INFO][3766] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3" Namespace="calico-apiserver" Pod="calico-apiserver-7c5689859f-l879k" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" May 10 00:43:57.284083 env[1202]: time="2025-05-10T00:43:57.284039970Z" level=info msg="CreateContainer within sandbox \"af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:43:57.291000 audit[3868]: NETFILTER_CFG table=filter:106 family=2 entries=52 op=nft_register_chain pid=3868 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:43:57.291000 audit[3868]: SYSCALL arch=c000003e syscall=46 success=yes exit=27056 a0=3 a1=7ffd7ac7f4a0 a2=0 a3=7ffd7ac7f48c items=0 ppid=3498 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.291000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:43:57.308495 env[1202]: time="2025-05-10T00:43:57.308092274Z" level=info msg="CreateContainer within sandbox \"af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"65aa3c4a27c1dadce2b31c61f07b001a688c79d463e54698d4225ad43ba72a68\"" May 10 00:43:57.309132 env[1202]: time="2025-05-10T00:43:57.309067927Z" level=info msg="StartContainer for \"65aa3c4a27c1dadce2b31c61f07b001a688c79d463e54698d4225ad43ba72a68\"" May 10 00:43:57.310535 env[1202]: time="2025-05-10T00:43:57.310467817Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:43:57.310535 env[1202]: time="2025-05-10T00:43:57.310515015Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:43:57.310535 env[1202]: time="2025-05-10T00:43:57.310525184Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:43:57.310761 env[1202]: time="2025-05-10T00:43:57.310696477Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3 pid=3881 runtime=io.containerd.runc.v2 May 10 00:43:57.322317 systemd[1]: Started cri-containerd-da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3.scope. May 10 00:43:57.329361 systemd[1]: Started cri-containerd-65aa3c4a27c1dadce2b31c61f07b001a688c79d463e54698d4225ad43ba72a68.scope. May 10 00:43:57.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.335000 audit: BPF prog-id=171 op=LOAD May 10 00:43:57.336000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.336000 audit[3894]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3881 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461376231626433313837383563323064383464643133343538336333 May 10 00:43:57.336000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.336000 audit[3894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3881 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461376231626433313837383563323064383464643133343538336333 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit: BPF prog-id=172 op=LOAD May 10 00:43:57.337000 audit[3894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003059a0 items=0 ppid=3881 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461376231626433313837383563323064383464643133343538336333 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.337000 audit: BPF prog-id=173 op=LOAD May 10 00:43:57.337000 audit[3894]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003059e8 items=0 ppid=3881 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461376231626433313837383563323064383464643133343538336333 May 10 00:43:57.338000 audit: BPF prog-id=173 op=UNLOAD May 10 00:43:57.338000 audit: BPF prog-id=172 op=UNLOAD May 10 00:43:57.338000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.338000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.338000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.338000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.338000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.338000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.338000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.338000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.338000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.339000 audit: BPF prog-id=174 op=LOAD May 10 00:43:57.339000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.339000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3824 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616133633461323763316461646365326233316336316630376230 May 10 00:43:57.339000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.339000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3824 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616133633461323763316461646365326233316336316630376230 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit: BPF prog-id=175 op=LOAD May 10 00:43:57.340000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000289710 items=0 ppid=3824 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616133633461323763316461646365326233316336316630376230 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit: BPF prog-id=176 op=LOAD May 10 00:43:57.340000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000289758 items=0 ppid=3824 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616133633461323763316461646365326233316336316630376230 May 10 00:43:57.340000 audit: BPF prog-id=176 op=UNLOAD May 10 00:43:57.340000 audit: BPF prog-id=175 op=UNLOAD May 10 00:43:57.340000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.340000 audit: BPF prog-id=177 op=LOAD May 10 00:43:57.340000 audit[3905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000289b68 items=0 ppid=3824 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616133633461323763316461646365326233316336316630376230 May 10 00:43:57.338000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.338000 audit: BPF prog-id=178 op=LOAD May 10 00:43:57.338000 audit[3894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000305df8 items=0 ppid=3881 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461376231626433313837383563323064383464643133343538336333 May 10 00:43:57.344504 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:43:57.360473 env[1202]: time="2025-05-10T00:43:57.360143388Z" level=info msg="StartContainer for \"65aa3c4a27c1dadce2b31c61f07b001a688c79d463e54698d4225ad43ba72a68\" returns successfully" May 10 00:43:57.373415 env[1202]: time="2025-05-10T00:43:57.373363323Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c5689859f-l879k,Uid:43a0790b-1277-4d8d-9090-56e515ec4483,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3\"" May 10 00:43:57.374000 audit[3925]: AVC avc: denied { getattr } for pid=3925 comm="coredns" path="cgroup:[4026532592]" dev="nsfs" ino=4026532592 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c973 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 10 00:43:57.374000 audit[3925]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c000100990 a2=c00049cd38 a3=0 items=0 ppid=3824 pid=3925 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c973 key=(null) May 10 00:43:57.374000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 10 00:43:57.652753 env[1202]: time="2025-05-10T00:43:57.652678201Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:57.655115 env[1202]: time="2025-05-10T00:43:57.655066778Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:57.657485 env[1202]: time="2025-05-10T00:43:57.657461156Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:57.659014 env[1202]: time="2025-05-10T00:43:57.658981692Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:43:57.659624 env[1202]: time="2025-05-10T00:43:57.659589805Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 00:43:57.662007 env[1202]: time="2025-05-10T00:43:57.661881290Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:43:57.663274 env[1202]: time="2025-05-10T00:43:57.663234442Z" level=info msg="CreateContainer within sandbox \"a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 00:43:57.682284 env[1202]: time="2025-05-10T00:43:57.682217904Z" level=info msg="CreateContainer within sandbox \"a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"ad921d021f236abddefe383df1e46e7a5db236617c8eef99ae17409176d83888\"" May 10 00:43:57.682901 env[1202]: time="2025-05-10T00:43:57.682864659Z" level=info msg="StartContainer for \"ad921d021f236abddefe383df1e46e7a5db236617c8eef99ae17409176d83888\"" May 10 00:43:57.709055 systemd[1]: Started cri-containerd-ad921d021f236abddefe383df1e46e7a5db236617c8eef99ae17409176d83888.scope. May 10 00:43:57.720000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.720000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fa404db5858 items=0 ppid=3433 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164393231643032316632333661626464656665333833646631653436 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit: BPF prog-id=179 op=LOAD May 10 00:43:57.721000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000390d08 items=0 ppid=3433 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164393231643032316632333661626464656665333833646631653436 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit: BPF prog-id=180 op=LOAD May 10 00:43:57.721000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000390d58 items=0 ppid=3433 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164393231643032316632333661626464656665333833646631653436 May 10 00:43:57.721000 audit: BPF prog-id=180 op=UNLOAD May 10 00:43:57.721000 audit: BPF prog-id=179 op=UNLOAD May 10 00:43:57.721000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:57.721000 audit: BPF prog-id=181 op=LOAD May 10 00:43:57.721000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000390de8 items=0 ppid=3433 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:57.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164393231643032316632333661626464656665333833646631653436 May 10 00:43:57.744368 env[1202]: time="2025-05-10T00:43:57.744319046Z" level=info msg="StopPodSandbox for \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\"" May 10 00:43:57.744804 env[1202]: time="2025-05-10T00:43:57.744350907Z" level=info msg="StopPodSandbox for \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\"" May 10 00:43:57.865119 env[1202]: time="2025-05-10T00:43:57.865058678Z" level=info msg="StartContainer for \"ad921d021f236abddefe383df1e46e7a5db236617c8eef99ae17409176d83888\" returns successfully" May 10 00:43:58.004000 kubelet[1947]: E0510 00:43:58.002966 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:58.009484 kubelet[1947]: E0510 00:43:58.009460 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:58.095791 env[1202]: 2025-05-10 00:43:57.864 [INFO][4018] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" May 10 00:43:58.095791 env[1202]: 2025-05-10 00:43:57.865 [INFO][4018] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" iface="eth0" netns="/var/run/netns/cni-31589753-aa70-080e-b7d1-03ea5b283048" May 10 00:43:58.095791 env[1202]: 2025-05-10 00:43:57.865 [INFO][4018] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" iface="eth0" netns="/var/run/netns/cni-31589753-aa70-080e-b7d1-03ea5b283048" May 10 00:43:58.095791 env[1202]: 2025-05-10 00:43:57.865 [INFO][4018] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" iface="eth0" netns="/var/run/netns/cni-31589753-aa70-080e-b7d1-03ea5b283048" May 10 00:43:58.095791 env[1202]: 2025-05-10 00:43:57.865 [INFO][4018] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" May 10 00:43:58.095791 env[1202]: 2025-05-10 00:43:57.865 [INFO][4018] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" May 10 00:43:58.095791 env[1202]: 2025-05-10 00:43:57.896 [INFO][4031] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" HandleID="k8s-pod-network.0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" Workload="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" May 10 00:43:58.095791 env[1202]: 2025-05-10 00:43:57.896 [INFO][4031] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:43:58.095791 env[1202]: 2025-05-10 00:43:57.896 [INFO][4031] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:43:58.095791 env[1202]: 2025-05-10 00:43:58.025 [WARNING][4031] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" HandleID="k8s-pod-network.0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" Workload="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" May 10 00:43:58.095791 env[1202]: 2025-05-10 00:43:58.025 [INFO][4031] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" HandleID="k8s-pod-network.0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" Workload="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" May 10 00:43:58.095791 env[1202]: 2025-05-10 00:43:58.090 [INFO][4031] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:43:58.095791 env[1202]: 2025-05-10 00:43:58.093 [INFO][4018] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" May 10 00:43:58.096511 env[1202]: time="2025-05-10T00:43:58.096115682Z" level=info msg="TearDown network for sandbox \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\" successfully" May 10 00:43:58.096511 env[1202]: time="2025-05-10T00:43:58.096158102Z" level=info msg="StopPodSandbox for \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\" returns successfully" May 10 00:43:58.096976 env[1202]: time="2025-05-10T00:43:58.096944960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c5689859f-kwbfr,Uid:e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6,Namespace:calico-apiserver,Attempt:1,}" May 10 00:43:58.178000 audit[4050]: NETFILTER_CFG table=filter:107 family=2 entries=10 op=nft_register_rule pid=4050 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:58.178000 audit[4050]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff01ab4560 a2=0 a3=7fff01ab454c items=0 ppid=2096 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:58.178000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:58.186000 audit[4050]: NETFILTER_CFG table=nat:108 family=2 entries=44 op=nft_register_rule pid=4050 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:58.186000 audit[4050]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff01ab4560 a2=0 a3=7fff01ab454c items=0 ppid=2096 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:58.186000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:58.226210 kubelet[1947]: I0510 00:43:58.226140 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-tqt8t" podStartSLOduration=40.226118541 podStartE2EDuration="40.226118541s" podCreationTimestamp="2025-05-10 00:43:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:43:58.091439498 +0000 UTC m=+45.424094986" watchObservedRunningTime="2025-05-10 00:43:58.226118541 +0000 UTC m=+45.558773999" May 10 00:43:58.228406 env[1202]: 2025-05-10 00:43:58.024 [INFO][4019] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" May 10 00:43:58.228406 env[1202]: 2025-05-10 00:43:58.024 [INFO][4019] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" iface="eth0" netns="/var/run/netns/cni-45fb875b-6737-9a1a-a989-bd90c7a321f1" May 10 00:43:58.228406 env[1202]: 2025-05-10 00:43:58.024 [INFO][4019] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" iface="eth0" netns="/var/run/netns/cni-45fb875b-6737-9a1a-a989-bd90c7a321f1" May 10 00:43:58.228406 env[1202]: 2025-05-10 00:43:58.025 [INFO][4019] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" iface="eth0" netns="/var/run/netns/cni-45fb875b-6737-9a1a-a989-bd90c7a321f1" May 10 00:43:58.228406 env[1202]: 2025-05-10 00:43:58.025 [INFO][4019] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" May 10 00:43:58.228406 env[1202]: 2025-05-10 00:43:58.025 [INFO][4019] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" May 10 00:43:58.228406 env[1202]: 2025-05-10 00:43:58.049 [INFO][4042] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" HandleID="k8s-pod-network.eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" Workload="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" May 10 00:43:58.228406 env[1202]: 2025-05-10 00:43:58.049 [INFO][4042] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:43:58.228406 env[1202]: 2025-05-10 00:43:58.091 [INFO][4042] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:43:58.228406 env[1202]: 2025-05-10 00:43:58.173 [WARNING][4042] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" HandleID="k8s-pod-network.eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" Workload="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" May 10 00:43:58.228406 env[1202]: 2025-05-10 00:43:58.173 [INFO][4042] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" HandleID="k8s-pod-network.eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" Workload="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" May 10 00:43:58.228406 env[1202]: 2025-05-10 00:43:58.224 [INFO][4042] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:43:58.228406 env[1202]: 2025-05-10 00:43:58.226 [INFO][4019] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" May 10 00:43:58.229686 env[1202]: time="2025-05-10T00:43:58.229584743Z" level=info msg="TearDown network for sandbox \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\" successfully" May 10 00:43:58.229686 env[1202]: time="2025-05-10T00:43:58.229638594Z" level=info msg="StopPodSandbox for \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\" returns successfully" May 10 00:43:58.230461 env[1202]: time="2025-05-10T00:43:58.230400234Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-564c889779-cshdq,Uid:7ecea60d-bb21-4a1a-9b83-d60da1b2b52e,Namespace:calico-system,Attempt:1,}" May 10 00:43:58.318000 audit[4052]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:58.318000 audit[4052]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffc23b22a0 a2=0 a3=7fffc23b228c items=0 ppid=2096 pid=4052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:58.318000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:58.339000 audit[4052]: NETFILTER_CFG table=nat:110 family=2 entries=56 op=nft_register_chain pid=4052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:43:58.339000 audit[4052]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fffc23b22a0 a2=0 a3=7fffc23b228c items=0 ppid=2096 pid=4052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:58.339000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:43:58.479279 systemd[1]: run-netns-cni\x2d31589753\x2daa70\x2d080e\x2db7d1\x2d03ea5b283048.mount: Deactivated successfully. May 10 00:43:58.479369 systemd[1]: run-netns-cni\x2d45fb875b\x2d6737\x2d9a1a\x2da989\x2dbd90c7a321f1.mount: Deactivated successfully. May 10 00:43:58.654523 systemd[1]: Started sshd@10-10.0.0.88:22-10.0.0.1:53354.service. May 10 00:43:58.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.88:22-10.0.0.1:53354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:58.704000 audit[4055]: USER_ACCT pid=4055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:58.706304 sshd[4055]: Accepted publickey for core from 10.0.0.1 port 53354 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:43:58.705000 audit[4055]: CRED_ACQ pid=4055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:58.705000 audit[4055]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb616dea0 a2=3 a3=0 items=0 ppid=1 pid=4055 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:58.705000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:43:58.707824 sshd[4055]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:43:58.712185 systemd-logind[1191]: New session 11 of user core. May 10 00:43:58.713039 systemd[1]: Started session-11.scope. May 10 00:43:58.719000 audit[4055]: USER_START pid=4055 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:58.720000 audit[4070]: CRED_ACQ pid=4070 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:58.842740 systemd-networkd[1030]: calif83bd6f6055: Gained IPv6LL May 10 00:43:58.843091 systemd-networkd[1030]: cali4531eda25b3: Gained IPv6LL May 10 00:43:58.866798 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:43:58.866938 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali04f5dee0955: link becomes ready May 10 00:43:58.864398 systemd-networkd[1030]: cali04f5dee0955: Link UP May 10 00:43:58.867177 systemd-networkd[1030]: cali04f5dee0955: Gained carrier May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.726 [INFO][4057] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0 calico-apiserver-7c5689859f- calico-apiserver e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6 896 0 2025-05-10 00:43:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7c5689859f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7c5689859f-kwbfr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali04f5dee0955 [] []}} ContainerID="b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" Namespace="calico-apiserver" Pod="calico-apiserver-7c5689859f-kwbfr" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-" May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.726 [INFO][4057] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" Namespace="calico-apiserver" Pod="calico-apiserver-7c5689859f-kwbfr" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.759 [INFO][4073] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" HandleID="k8s-pod-network.b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" Workload="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.768 [INFO][4073] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" HandleID="k8s-pod-network.b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" Workload="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000502130), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7c5689859f-kwbfr", "timestamp":"2025-05-10 00:43:58.759399181 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.768 [INFO][4073] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.768 [INFO][4073] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.768 [INFO][4073] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.770 [INFO][4073] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" host="localhost" May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.774 [INFO][4073] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.778 [INFO][4073] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.780 [INFO][4073] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.782 [INFO][4073] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.782 [INFO][4073] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" host="localhost" May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.784 [INFO][4073] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561 May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.819 [INFO][4073] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" host="localhost" May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.859 [INFO][4073] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" host="localhost" May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.859 [INFO][4073] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" host="localhost" May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.859 [INFO][4073] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:43:58.901934 env[1202]: 2025-05-10 00:43:58.859 [INFO][4073] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" HandleID="k8s-pod-network.b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" Workload="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" May 10 00:43:58.904479 env[1202]: 2025-05-10 00:43:58.862 [INFO][4057] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" Namespace="calico-apiserver" Pod="calico-apiserver-7c5689859f-kwbfr" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0", GenerateName:"calico-apiserver-7c5689859f-", Namespace:"calico-apiserver", SelfLink:"", UID:"e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6", ResourceVersion:"896", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c5689859f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7c5689859f-kwbfr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali04f5dee0955", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:43:58.904479 env[1202]: 2025-05-10 00:43:58.862 [INFO][4057] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" Namespace="calico-apiserver" Pod="calico-apiserver-7c5689859f-kwbfr" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" May 10 00:43:58.904479 env[1202]: 2025-05-10 00:43:58.862 [INFO][4057] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali04f5dee0955 ContainerID="b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" Namespace="calico-apiserver" Pod="calico-apiserver-7c5689859f-kwbfr" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" May 10 00:43:58.904479 env[1202]: 2025-05-10 00:43:58.867 [INFO][4057] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" Namespace="calico-apiserver" Pod="calico-apiserver-7c5689859f-kwbfr" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" May 10 00:43:58.904479 env[1202]: 2025-05-10 00:43:58.867 [INFO][4057] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" Namespace="calico-apiserver" Pod="calico-apiserver-7c5689859f-kwbfr" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0", GenerateName:"calico-apiserver-7c5689859f-", Namespace:"calico-apiserver", SelfLink:"", UID:"e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6", ResourceVersion:"896", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c5689859f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561", Pod:"calico-apiserver-7c5689859f-kwbfr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali04f5dee0955", MAC:"46:f3:44:06:26:31", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:43:58.904479 env[1202]: 2025-05-10 00:43:58.895 [INFO][4057] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561" Namespace="calico-apiserver" Pod="calico-apiserver-7c5689859f-kwbfr" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" May 10 00:43:58.909000 audit[4105]: NETFILTER_CFG table=filter:111 family=2 entries=46 op=nft_register_chain pid=4105 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:43:58.909000 audit[4105]: SYSCALL arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7fff9dabd570 a2=0 a3=7fff9dabd55c items=0 ppid=3498 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:58.909000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:43:58.931583 sshd[4055]: pam_unix(sshd:session): session closed for user core May 10 00:43:58.931000 audit[4055]: USER_END pid=4055 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:58.931000 audit[4055]: CRED_DISP pid=4055 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:43:58.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.88:22-10.0.0.1:53354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:58.934516 systemd[1]: sshd@10-10.0.0.88:22-10.0.0.1:53354.service: Deactivated successfully. May 10 00:43:58.936440 systemd[1]: session-11.scope: Deactivated successfully. May 10 00:43:58.936901 systemd-logind[1191]: Session 11 logged out. Waiting for processes to exit. May 10 00:43:58.938090 systemd-logind[1191]: Removed session 11. May 10 00:43:58.941507 env[1202]: time="2025-05-10T00:43:58.941415202Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:43:58.941600 env[1202]: time="2025-05-10T00:43:58.941518467Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:43:58.941600 env[1202]: time="2025-05-10T00:43:58.941583679Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:43:58.942128 env[1202]: time="2025-05-10T00:43:58.942045887Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561 pid=4128 runtime=io.containerd.runc.v2 May 10 00:43:58.961015 systemd[1]: Started cri-containerd-b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561.scope. May 10 00:43:58.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit: BPF prog-id=182 op=LOAD May 10 00:43:58.984000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[4138]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4128 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:58.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239633736343266356261626233303238353863633436336435613137 May 10 00:43:58.984000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[4138]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4128 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:58.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239633736343266356261626233303238353863633436336435613137 May 10 00:43:58.984000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.984000 audit: BPF prog-id=183 op=LOAD May 10 00:43:58.984000 audit[4138]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000230570 items=0 ppid=4128 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:58.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239633736343266356261626233303238353863633436336435613137 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit: BPF prog-id=184 op=LOAD May 10 00:43:58.985000 audit[4138]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002305b8 items=0 ppid=4128 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:58.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239633736343266356261626233303238353863633436336435613137 May 10 00:43:58.985000 audit: BPF prog-id=184 op=UNLOAD May 10 00:43:58.985000 audit: BPF prog-id=183 op=UNLOAD May 10 00:43:58.985000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:58.985000 audit: BPF prog-id=185 op=LOAD May 10 00:43:58.985000 audit[4138]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002309c8 items=0 ppid=4128 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:58.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239633736343266356261626233303238353863633436336435613137 May 10 00:43:58.987687 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:43:59.012024 kubelet[1947]: E0510 00:43:59.011614 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:43:59.015687 env[1202]: time="2025-05-10T00:43:59.015637371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c5689859f-kwbfr,Uid:e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561\"" May 10 00:43:59.226623 systemd-networkd[1030]: calicd09dc5b0e0: Link UP May 10 00:43:59.228776 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicd09dc5b0e0: link becomes ready May 10 00:43:59.228518 systemd-networkd[1030]: calicd09dc5b0e0: Gained carrier May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:58.950 [INFO][4106] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0 calico-kube-controllers-564c889779- calico-system 7ecea60d-bb21-4a1a-9b83-d60da1b2b52e 900 0 2025-05-10 00:43:25 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:564c889779 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-564c889779-cshdq eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calicd09dc5b0e0 [] []}} ContainerID="240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" Namespace="calico-system" Pod="calico-kube-controllers-564c889779-cshdq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--564c889779--cshdq-" May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:58.950 [INFO][4106] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" Namespace="calico-system" Pod="calico-kube-controllers-564c889779-cshdq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:58.991 [INFO][4149] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" HandleID="k8s-pod-network.240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" Workload="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:59.000 [INFO][4149] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" HandleID="k8s-pod-network.240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" Workload="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000374cf0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-564c889779-cshdq", "timestamp":"2025-05-10 00:43:58.991309224 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:59.000 [INFO][4149] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:59.000 [INFO][4149] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:59.000 [INFO][4149] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:59.002 [INFO][4149] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" host="localhost" May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:59.006 [INFO][4149] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:59.012 [INFO][4149] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:59.065 [INFO][4149] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:59.107 [INFO][4149] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:59.107 [INFO][4149] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" host="localhost" May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:59.130 [INFO][4149] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:59.159 [INFO][4149] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" host="localhost" May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:59.222 [INFO][4149] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" host="localhost" May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:59.222 [INFO][4149] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" host="localhost" May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:59.222 [INFO][4149] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:43:59.244274 env[1202]: 2025-05-10 00:43:59.222 [INFO][4149] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" HandleID="k8s-pod-network.240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" Workload="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" May 10 00:43:59.245204 env[1202]: 2025-05-10 00:43:59.224 [INFO][4106] cni-plugin/k8s.go 386: Populated endpoint ContainerID="240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" Namespace="calico-system" Pod="calico-kube-controllers-564c889779-cshdq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0", GenerateName:"calico-kube-controllers-564c889779-", Namespace:"calico-system", SelfLink:"", UID:"7ecea60d-bb21-4a1a-9b83-d60da1b2b52e", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"564c889779", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-564c889779-cshdq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicd09dc5b0e0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:43:59.245204 env[1202]: 2025-05-10 00:43:59.224 [INFO][4106] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" Namespace="calico-system" Pod="calico-kube-controllers-564c889779-cshdq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" May 10 00:43:59.245204 env[1202]: 2025-05-10 00:43:59.224 [INFO][4106] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicd09dc5b0e0 ContainerID="240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" Namespace="calico-system" Pod="calico-kube-controllers-564c889779-cshdq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" May 10 00:43:59.245204 env[1202]: 2025-05-10 00:43:59.228 [INFO][4106] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" Namespace="calico-system" Pod="calico-kube-controllers-564c889779-cshdq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" May 10 00:43:59.245204 env[1202]: 2025-05-10 00:43:59.229 [INFO][4106] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" Namespace="calico-system" Pod="calico-kube-controllers-564c889779-cshdq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0", GenerateName:"calico-kube-controllers-564c889779-", Namespace:"calico-system", SelfLink:"", UID:"7ecea60d-bb21-4a1a-9b83-d60da1b2b52e", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"564c889779", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de", Pod:"calico-kube-controllers-564c889779-cshdq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicd09dc5b0e0", MAC:"5a:9d:f3:1c:6d:8d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:43:59.245204 env[1202]: 2025-05-10 00:43:59.240 [INFO][4106] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de" Namespace="calico-system" Pod="calico-kube-controllers-564c889779-cshdq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" May 10 00:43:59.258909 env[1202]: time="2025-05-10T00:43:59.258819786Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:43:59.258909 env[1202]: time="2025-05-10T00:43:59.258862015Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:43:59.258909 env[1202]: time="2025-05-10T00:43:59.258875220Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:43:59.259163 env[1202]: time="2025-05-10T00:43:59.259026034Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de pid=4191 runtime=io.containerd.runc.v2 May 10 00:43:59.257000 audit[4192]: NETFILTER_CFG table=filter:112 family=2 entries=50 op=nft_register_chain pid=4192 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:43:59.257000 audit[4192]: SYSCALL arch=c000003e syscall=46 success=yes exit=23392 a0=3 a1=7ffcb1fd7210 a2=0 a3=7ffcb1fd71fc items=0 ppid=3498 pid=4192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:59.257000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:43:59.271378 systemd[1]: Started cri-containerd-240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de.scope. May 10 00:43:59.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit: BPF prog-id=186 op=LOAD May 10 00:43:59.284000 audit[4200]: AVC avc: denied { bpf } for pid=4200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4191 pid=4200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:59.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234306162633761333266366266386131373766626466313565636630 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { perfmon } for pid=4200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4191 pid=4200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:59.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234306162633761333266366266386131373766626466313565636630 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { bpf } for pid=4200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { bpf } for pid=4200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { bpf } for pid=4200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { perfmon } for pid=4200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { perfmon } for pid=4200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { perfmon } for pid=4200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { perfmon } for pid=4200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { perfmon } for pid=4200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { bpf } for pid=4200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { bpf } for pid=4200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit: BPF prog-id=187 op=LOAD May 10 00:43:59.284000 audit[4200]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000261ce0 items=0 ppid=4191 pid=4200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:59.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234306162633761333266366266386131373766626466313565636630 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { bpf } for pid=4200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { bpf } for pid=4200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { perfmon } for pid=4200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { perfmon } for pid=4200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { perfmon } for pid=4200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { perfmon } for pid=4200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { perfmon } for pid=4200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { bpf } for pid=4200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { bpf } for pid=4200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit: BPF prog-id=188 op=LOAD May 10 00:43:59.284000 audit[4200]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000261d28 items=0 ppid=4191 pid=4200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:59.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234306162633761333266366266386131373766626466313565636630 May 10 00:43:59.284000 audit: BPF prog-id=188 op=UNLOAD May 10 00:43:59.284000 audit: BPF prog-id=187 op=UNLOAD May 10 00:43:59.284000 audit[4200]: AVC avc: denied { bpf } for pid=4200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { bpf } for pid=4200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { bpf } for pid=4200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { perfmon } for pid=4200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { perfmon } for pid=4200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { perfmon } for pid=4200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { perfmon } for pid=4200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { perfmon } for pid=4200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { bpf } for pid=4200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit[4200]: AVC avc: denied { bpf } for pid=4200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:43:59.284000 audit: BPF prog-id=189 op=LOAD May 10 00:43:59.284000 audit[4200]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e4138 items=0 ppid=4191 pid=4200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:59.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234306162633761333266366266386131373766626466313565636630 May 10 00:43:59.287255 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 00:43:59.312001 env[1202]: time="2025-05-10T00:43:59.311936062Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-564c889779-cshdq,Uid:7ecea60d-bb21-4a1a-9b83-d60da1b2b52e,Namespace:calico-system,Attempt:1,} returns sandbox id \"240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de\"" May 10 00:44:00.016735 kubelet[1947]: E0510 00:44:00.016699 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:44:00.379229 systemd-networkd[1030]: cali04f5dee0955: Gained IPv6LL May 10 00:44:00.890801 systemd-networkd[1030]: calicd09dc5b0e0: Gained IPv6LL May 10 00:44:01.231028 env[1202]: time="2025-05-10T00:44:01.230876511Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:01.232944 env[1202]: time="2025-05-10T00:44:01.232900933Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:01.240322 env[1202]: time="2025-05-10T00:44:01.240268048Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:01.254771 env[1202]: time="2025-05-10T00:44:01.254699028Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:01.255223 env[1202]: time="2025-05-10T00:44:01.255162458Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:44:01.256999 env[1202]: time="2025-05-10T00:44:01.256959112Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 00:44:01.257955 env[1202]: time="2025-05-10T00:44:01.257924485Z" level=info msg="CreateContainer within sandbox \"da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:44:01.277037 env[1202]: time="2025-05-10T00:44:01.276964281Z" level=info msg="CreateContainer within sandbox \"da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"606106eee9ff8e07056ce4ba7059918e2b27679401d7f4f1c1c96829499626b2\"" May 10 00:44:01.277677 env[1202]: time="2025-05-10T00:44:01.277643126Z" level=info msg="StartContainer for \"606106eee9ff8e07056ce4ba7059918e2b27679401d7f4f1c1c96829499626b2\"" May 10 00:44:01.302068 systemd[1]: run-containerd-runc-k8s.io-606106eee9ff8e07056ce4ba7059918e2b27679401d7f4f1c1c96829499626b2-runc.3t46LT.mount: Deactivated successfully. May 10 00:44:01.304523 systemd[1]: Started cri-containerd-606106eee9ff8e07056ce4ba7059918e2b27679401d7f4f1c1c96829499626b2.scope. May 10 00:44:01.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit: BPF prog-id=190 op=LOAD May 10 00:44:01.317000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3881 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:01.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363130366565653966663865303730353663653462613730353939 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3881 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:01.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363130366565653966663865303730353663653462613730353939 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit: BPF prog-id=191 op=LOAD May 10 00:44:01.317000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002b5d40 items=0 ppid=3881 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:01.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363130366565653966663865303730353663653462613730353939 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.317000 audit: BPF prog-id=192 op=LOAD May 10 00:44:01.317000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002b5d88 items=0 ppid=3881 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:01.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363130366565653966663865303730353663653462613730353939 May 10 00:44:01.318000 audit: BPF prog-id=192 op=UNLOAD May 10 00:44:01.318000 audit: BPF prog-id=191 op=UNLOAD May 10 00:44:01.318000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.318000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.318000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.318000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.318000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.318000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.318000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.318000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.318000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.318000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:01.318000 audit: BPF prog-id=193 op=LOAD May 10 00:44:01.318000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00039c198 items=0 ppid=3881 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:01.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363130366565653966663865303730353663653462613730353939 May 10 00:44:01.419342 env[1202]: time="2025-05-10T00:44:01.419263520Z" level=info msg="StartContainer for \"606106eee9ff8e07056ce4ba7059918e2b27679401d7f4f1c1c96829499626b2\" returns successfully" May 10 00:44:02.038080 kubelet[1947]: I0510 00:44:02.037996 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7c5689859f-l879k" podStartSLOduration=33.156369716 podStartE2EDuration="37.037966962s" podCreationTimestamp="2025-05-10 00:43:25 +0000 UTC" firstStartedPulling="2025-05-10 00:43:57.374881404 +0000 UTC m=+44.707536862" lastFinishedPulling="2025-05-10 00:44:01.25647865 +0000 UTC m=+48.589134108" observedRunningTime="2025-05-10 00:44:02.037441986 +0000 UTC m=+49.370097444" watchObservedRunningTime="2025-05-10 00:44:02.037966962 +0000 UTC m=+49.370622420" May 10 00:44:02.051000 audit[4274]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:02.051000 audit[4274]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffbba84840 a2=0 a3=7fffbba8482c items=0 ppid=2096 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:02.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:02.060000 audit[4274]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:02.060000 audit[4274]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffbba84840 a2=0 a3=7fffbba8482c items=0 ppid=2096 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:02.060000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:02.433000 audit[4251]: AVC avc: denied { watch } for pid=4251 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_43_41.3921504556/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c765 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c706,c765 tclass=file permissive=0 May 10 00:44:02.437563 kernel: kauditd_printk_skb: 419 callbacks suppressed May 10 00:44:02.437660 kernel: audit: type=1400 audit(1746837842.433:1329): avc: denied { watch } for pid=4251 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_43_41.3921504556/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c706,c765 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c706,c765 tclass=file permissive=0 May 10 00:44:02.433000 audit[4251]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b6f6c0 a2=fc6 a3=0 items=0 ppid=3881 pid=4251 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c765 key=(null) May 10 00:44:02.460298 kernel: audit: type=1300 audit(1746837842.433:1329): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b6f6c0 a2=fc6 a3=0 items=0 ppid=3881 pid=4251 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c706,c765 key=(null) May 10 00:44:02.460481 kernel: audit: type=1327 audit(1746837842.433:1329): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:44:02.433000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:44:03.024996 kubelet[1947]: I0510 00:44:03.024957 1947 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:44:03.132303 env[1202]: time="2025-05-10T00:44:03.132245229Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:03.134299 env[1202]: time="2025-05-10T00:44:03.134259741Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:03.135957 env[1202]: time="2025-05-10T00:44:03.135903147Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:03.137390 env[1202]: time="2025-05-10T00:44:03.137333433Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:03.137890 env[1202]: time="2025-05-10T00:44:03.137848570Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 00:44:03.139036 env[1202]: time="2025-05-10T00:44:03.138761675Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:44:03.140037 env[1202]: time="2025-05-10T00:44:03.139997705Z" level=info msg="CreateContainer within sandbox \"a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 00:44:03.154751 env[1202]: time="2025-05-10T00:44:03.154708277Z" level=info msg="CreateContainer within sandbox \"a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"2bc632e20efc73b4b40a5fca1e6a949a49f86b1b69d23fb50dfc4eba94d72807\"" May 10 00:44:03.155394 env[1202]: time="2025-05-10T00:44:03.155368576Z" level=info msg="StartContainer for \"2bc632e20efc73b4b40a5fca1e6a949a49f86b1b69d23fb50dfc4eba94d72807\"" May 10 00:44:03.176170 systemd[1]: Started cri-containerd-2bc632e20efc73b4b40a5fca1e6a949a49f86b1b69d23fb50dfc4eba94d72807.scope. May 10 00:44:03.187000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.187000 audit[4284]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe5fd83cde8 items=0 ppid=3433 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:03.196448 kernel: audit: type=1400 audit(1746837843.187:1330): avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.196511 kernel: audit: type=1300 audit(1746837843.187:1330): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe5fd83cde8 items=0 ppid=3433 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:03.196574 kernel: audit: type=1327 audit(1746837843.187:1330): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262633633326532306566633733623462343061356663613165366139 May 10 00:44:03.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262633633326532306566633733623462343061356663613165366139 May 10 00:44:03.200572 kernel: audit: type=1400 audit(1746837843.187:1331): avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.187000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.187000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.206402 kernel: audit: type=1400 audit(1746837843.187:1331): avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.206448 kernel: audit: type=1400 audit(1746837843.187:1331): avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.187000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.187000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.213579 kernel: audit: type=1400 audit(1746837843.187:1331): avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.187000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.187000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.187000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.187000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.187000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.187000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.187000 audit: BPF prog-id=194 op=LOAD May 10 00:44:03.187000 audit[4284]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000300d58 items=0 ppid=3433 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:03.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262633633326532306566633733623462343061356663613165366139 May 10 00:44:03.195000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.195000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.195000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.195000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.195000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.195000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.195000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.195000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.195000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.195000 audit: BPF prog-id=195 op=LOAD May 10 00:44:03.195000 audit[4284]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000300da8 items=0 ppid=3433 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:03.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262633633326532306566633733623462343061356663613165366139 May 10 00:44:03.199000 audit: BPF prog-id=195 op=UNLOAD May 10 00:44:03.199000 audit: BPF prog-id=194 op=UNLOAD May 10 00:44:03.199000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.199000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.199000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.199000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.199000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.199000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.199000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.199000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.199000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.199000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.199000 audit: BPF prog-id=196 op=LOAD May 10 00:44:03.199000 audit[4284]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000300e38 items=0 ppid=3433 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:03.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262633633326532306566633733623462343061356663613165366139 May 10 00:44:03.584118 env[1202]: time="2025-05-10T00:44:03.584049538Z" level=info msg="StartContainer for \"2bc632e20efc73b4b40a5fca1e6a949a49f86b1b69d23fb50dfc4eba94d72807\" returns successfully" May 10 00:44:03.689821 env[1202]: time="2025-05-10T00:44:03.689744197Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:03.692869 env[1202]: time="2025-05-10T00:44:03.692805035Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:03.695355 env[1202]: time="2025-05-10T00:44:03.695257720Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:03.697269 env[1202]: time="2025-05-10T00:44:03.697216096Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:03.697688 env[1202]: time="2025-05-10T00:44:03.697658056Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:44:03.698802 env[1202]: time="2025-05-10T00:44:03.698619101Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 10 00:44:03.699531 env[1202]: time="2025-05-10T00:44:03.699508421Z" level=info msg="CreateContainer within sandbox \"b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:44:03.716427 env[1202]: time="2025-05-10T00:44:03.716341929Z" level=info msg="CreateContainer within sandbox \"b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"87d9bab292dc458045006cb56a3e5d3c8b1ff3af4159273d0d389e4d147d6ecf\"" May 10 00:44:03.717179 env[1202]: time="2025-05-10T00:44:03.717101254Z" level=info msg="StartContainer for \"87d9bab292dc458045006cb56a3e5d3c8b1ff3af4159273d0d389e4d147d6ecf\"" May 10 00:44:03.735190 systemd[1]: Started cri-containerd-87d9bab292dc458045006cb56a3e5d3c8b1ff3af4159273d0d389e4d147d6ecf.scope. May 10 00:44:03.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit: BPF prog-id=197 op=LOAD May 10 00:44:03.747000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4128 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:03.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837643962616232393264633435383034353030366362353661336535 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4128 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:03.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837643962616232393264633435383034353030366362353661336535 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit: BPF prog-id=198 op=LOAD May 10 00:44:03.747000 audit[4321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002176e0 items=0 ppid=4128 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:03.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837643962616232393264633435383034353030366362353661336535 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.747000 audit: BPF prog-id=199 op=LOAD May 10 00:44:03.747000 audit[4321]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000217728 items=0 ppid=4128 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:03.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837643962616232393264633435383034353030366362353661336535 May 10 00:44:03.747000 audit: BPF prog-id=199 op=UNLOAD May 10 00:44:03.748000 audit: BPF prog-id=198 op=UNLOAD May 10 00:44:03.748000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.748000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.748000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.748000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.748000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.748000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.748000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.748000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.748000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.748000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:03.748000 audit: BPF prog-id=200 op=LOAD May 10 00:44:03.748000 audit[4321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000217b38 items=0 ppid=4128 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:03.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837643962616232393264633435383034353030366362353661336535 May 10 00:44:03.778617 env[1202]: time="2025-05-10T00:44:03.778533574Z" level=info msg="StartContainer for \"87d9bab292dc458045006cb56a3e5d3c8b1ff3af4159273d0d389e4d147d6ecf\" returns successfully" May 10 00:44:03.935133 systemd[1]: Started sshd@11-10.0.0.88:22-10.0.0.1:53364.service. May 10 00:44:03.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.88:22-10.0.0.1:53364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:03.986851 kubelet[1947]: I0510 00:44:03.986799 1947 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 00:44:03.987269 kubelet[1947]: I0510 00:44:03.986879 1947 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 00:44:04.050000 audit[4354]: USER_ACCT pid=4354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.051979 sshd[4354]: Accepted publickey for core from 10.0.0.1 port 53364 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:44:04.051000 audit[4354]: CRED_ACQ pid=4354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.051000 audit[4354]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebb820d40 a2=3 a3=0 items=0 ppid=1 pid=4354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:04.051000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:04.053309 sshd[4354]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:04.057087 systemd-logind[1191]: New session 12 of user core. May 10 00:44:04.060000 audit[4354]: USER_START pid=4354 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.062000 audit[4356]: CRED_ACQ pid=4356 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.058076 systemd[1]: Started session-12.scope. May 10 00:44:04.174998 kubelet[1947]: I0510 00:44:04.174907 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-kzprd" podStartSLOduration=31.099089399 podStartE2EDuration="39.174877074s" podCreationTimestamp="2025-05-10 00:43:25 +0000 UTC" firstStartedPulling="2025-05-10 00:43:55.062845327 +0000 UTC m=+42.395500775" lastFinishedPulling="2025-05-10 00:44:03.138632992 +0000 UTC m=+50.471288450" observedRunningTime="2025-05-10 00:44:04.077679161 +0000 UTC m=+51.410334639" watchObservedRunningTime="2025-05-10 00:44:04.174877074 +0000 UTC m=+51.507532552" May 10 00:44:04.201000 audit[4366]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:04.201000 audit[4366]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd0b1f2bf0 a2=0 a3=7ffd0b1f2bdc items=0 ppid=2096 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:04.201000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:04.205000 audit[4366]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:04.205000 audit[4366]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd0b1f2bf0 a2=0 a3=7ffd0b1f2bdc items=0 ppid=2096 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:04.205000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:04.296123 sshd[4354]: pam_unix(sshd:session): session closed for user core May 10 00:44:04.295000 audit[4354]: USER_END pid=4354 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.296000 audit[4354]: CRED_DISP pid=4354 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.88:22-10.0.0.1:53364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:04.299410 systemd[1]: sshd@11-10.0.0.88:22-10.0.0.1:53364.service: Deactivated successfully. May 10 00:44:04.300114 systemd[1]: session-12.scope: Deactivated successfully. May 10 00:44:04.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.88:22-10.0.0.1:53376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:04.301979 systemd[1]: Started sshd@12-10.0.0.88:22-10.0.0.1:53376.service. May 10 00:44:04.303000 systemd-logind[1191]: Session 12 logged out. Waiting for processes to exit. May 10 00:44:04.303947 systemd-logind[1191]: Removed session 12. May 10 00:44:04.341000 audit[4373]: USER_ACCT pid=4373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.343618 sshd[4373]: Accepted publickey for core from 10.0.0.1 port 53376 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:44:04.342000 audit[4373]: CRED_ACQ pid=4373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.343000 audit[4373]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3b59f000 a2=3 a3=0 items=0 ppid=1 pid=4373 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:04.343000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:04.344911 sshd[4373]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:04.350531 systemd[1]: Started session-13.scope. May 10 00:44:04.350948 systemd-logind[1191]: New session 13 of user core. May 10 00:44:04.356000 audit[4373]: USER_START pid=4373 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.357000 audit[4375]: CRED_ACQ pid=4375 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.535513 sshd[4373]: pam_unix(sshd:session): session closed for user core May 10 00:44:04.540407 systemd[1]: Started sshd@13-10.0.0.88:22-10.0.0.1:53386.service. May 10 00:44:04.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.88:22-10.0.0.1:53386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:04.541000 audit[4373]: USER_END pid=4373 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.541000 audit[4373]: CRED_DISP pid=4373 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.544650 systemd[1]: sshd@12-10.0.0.88:22-10.0.0.1:53376.service: Deactivated successfully. May 10 00:44:04.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.88:22-10.0.0.1:53376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:04.545764 systemd[1]: session-13.scope: Deactivated successfully. May 10 00:44:04.546958 systemd-logind[1191]: Session 13 logged out. Waiting for processes to exit. May 10 00:44:04.548873 systemd-logind[1191]: Removed session 13. May 10 00:44:04.583000 audit[4383]: USER_ACCT pid=4383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.585450 sshd[4383]: Accepted publickey for core from 10.0.0.1 port 53386 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:44:04.585000 audit[4383]: CRED_ACQ pid=4383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.585000 audit[4383]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc8dc3ec0 a2=3 a3=0 items=0 ppid=1 pid=4383 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:04.585000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:04.587166 sshd[4383]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:04.594177 systemd[1]: Started session-14.scope. May 10 00:44:04.595236 systemd-logind[1191]: New session 14 of user core. May 10 00:44:04.601000 audit[4383]: USER_START pid=4383 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.605000 audit[4386]: CRED_ACQ pid=4386 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.732777 sshd[4383]: pam_unix(sshd:session): session closed for user core May 10 00:44:04.732000 audit[4383]: USER_END pid=4383 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.732000 audit[4383]: CRED_DISP pid=4383 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:04.735914 systemd[1]: sshd@13-10.0.0.88:22-10.0.0.1:53386.service: Deactivated successfully. May 10 00:44:04.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.88:22-10.0.0.1:53386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:04.736779 systemd[1]: session-14.scope: Deactivated successfully. May 10 00:44:04.737401 systemd-logind[1191]: Session 14 logged out. Waiting for processes to exit. May 10 00:44:04.738180 systemd-logind[1191]: Removed session 14. May 10 00:44:04.818000 audit[4332]: AVC avc: denied { watch } for pid=4332 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_43_41.4057409887/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c54,c776 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c54,c776 tclass=file permissive=0 May 10 00:44:04.818000 audit[4332]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0005031c0 a2=fc6 a3=0 items=0 ppid=4128 pid=4332 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c54,c776 key=(null) May 10 00:44:04.818000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:44:05.036917 kubelet[1947]: I0510 00:44:05.036864 1947 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:44:06.445441 env[1202]: time="2025-05-10T00:44:06.445320855Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:06.451795 env[1202]: time="2025-05-10T00:44:06.451703858Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:06.453881 env[1202]: time="2025-05-10T00:44:06.453821112Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:06.456425 env[1202]: time="2025-05-10T00:44:06.456355381Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:06.456979 env[1202]: time="2025-05-10T00:44:06.456926543Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 10 00:44:06.466966 env[1202]: time="2025-05-10T00:44:06.466779610Z" level=info msg="CreateContainer within sandbox \"240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 00:44:06.484213 env[1202]: time="2025-05-10T00:44:06.484143127Z" level=info msg="CreateContainer within sandbox \"240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"4a2bb0f5a2253f71d025d424795d4faf1bbdd465374a72235aae635b56f30fed\"" May 10 00:44:06.484831 env[1202]: time="2025-05-10T00:44:06.484805852Z" level=info msg="StartContainer for \"4a2bb0f5a2253f71d025d424795d4faf1bbdd465374a72235aae635b56f30fed\"" May 10 00:44:06.501512 systemd[1]: Started cri-containerd-4a2bb0f5a2253f71d025d424795d4faf1bbdd465374a72235aae635b56f30fed.scope. May 10 00:44:06.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.512000 audit: BPF prog-id=201 op=LOAD May 10 00:44:06.513000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4191 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:06.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461326262306635613232353366373164303235643432343739356434 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4191 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:06.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461326262306635613232353366373164303235643432343739356434 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit: BPF prog-id=202 op=LOAD May 10 00:44:06.513000 audit[4412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000096560 items=0 ppid=4191 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:06.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461326262306635613232353366373164303235643432343739356434 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit: BPF prog-id=203 op=LOAD May 10 00:44:06.513000 audit[4412]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000965a8 items=0 ppid=4191 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:06.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461326262306635613232353366373164303235643432343739356434 May 10 00:44:06.513000 audit: BPF prog-id=203 op=UNLOAD May 10 00:44:06.513000 audit: BPF prog-id=202 op=UNLOAD May 10 00:44:06.513000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:06.513000 audit: BPF prog-id=204 op=LOAD May 10 00:44:06.513000 audit[4412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000969b8 items=0 ppid=4191 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:06.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461326262306635613232353366373164303235643432343739356434 May 10 00:44:06.544138 env[1202]: time="2025-05-10T00:44:06.544072283Z" level=info msg="StartContainer for \"4a2bb0f5a2253f71d025d424795d4faf1bbdd465374a72235aae635b56f30fed\" returns successfully" May 10 00:44:07.056041 kubelet[1947]: I0510 00:44:07.055955 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7c5689859f-kwbfr" podStartSLOduration=37.374714067 podStartE2EDuration="42.055924692s" podCreationTimestamp="2025-05-10 00:43:25 +0000 UTC" firstStartedPulling="2025-05-10 00:43:59.017205155 +0000 UTC m=+46.349860603" lastFinishedPulling="2025-05-10 00:44:03.69841577 +0000 UTC m=+51.031071228" observedRunningTime="2025-05-10 00:44:04.175628866 +0000 UTC m=+51.508284344" watchObservedRunningTime="2025-05-10 00:44:07.055924692 +0000 UTC m=+54.388580150" May 10 00:44:07.096082 kubelet[1947]: I0510 00:44:07.096013 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-564c889779-cshdq" podStartSLOduration=34.951380879 podStartE2EDuration="42.095992267s" podCreationTimestamp="2025-05-10 00:43:25 +0000 UTC" firstStartedPulling="2025-05-10 00:43:59.313315142 +0000 UTC m=+46.645970600" lastFinishedPulling="2025-05-10 00:44:06.45792653 +0000 UTC m=+53.790581988" observedRunningTime="2025-05-10 00:44:07.056620869 +0000 UTC m=+54.389276347" watchObservedRunningTime="2025-05-10 00:44:07.095992267 +0000 UTC m=+54.428647725" May 10 00:44:09.737756 systemd[1]: Started sshd@14-10.0.0.88:22-10.0.0.1:53824.service. May 10 00:44:09.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.88:22-10.0.0.1:53824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:09.739070 kernel: kauditd_printk_skb: 192 callbacks suppressed May 10 00:44:09.739356 kernel: audit: type=1130 audit(1746837849.736:1402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.88:22-10.0.0.1:53824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:09.781000 audit[4464]: USER_ACCT pid=4464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:09.783035 sshd[4464]: Accepted publickey for core from 10.0.0.1 port 53824 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:44:09.785498 sshd[4464]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:09.782000 audit[4464]: CRED_ACQ pid=4464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:09.789907 systemd-logind[1191]: New session 15 of user core. May 10 00:44:09.790665 systemd[1]: Started session-15.scope. May 10 00:44:09.792852 kernel: audit: type=1101 audit(1746837849.781:1403): pid=4464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:09.792908 kernel: audit: type=1103 audit(1746837849.782:1404): pid=4464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:09.792935 kernel: audit: type=1006 audit(1746837849.783:1405): pid=4464 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 10 00:44:09.783000 audit[4464]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc8831d60 a2=3 a3=0 items=0 ppid=1 pid=4464 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:09.807027 kernel: audit: type=1300 audit(1746837849.783:1405): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc8831d60 a2=3 a3=0 items=0 ppid=1 pid=4464 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:09.807083 kernel: audit: type=1327 audit(1746837849.783:1405): proctitle=737368643A20636F7265205B707269765D May 10 00:44:09.783000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:09.808411 kernel: audit: type=1105 audit(1746837849.793:1406): pid=4464 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:09.793000 audit[4464]: USER_START pid=4464 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:09.812818 kernel: audit: type=1103 audit(1746837849.795:1407): pid=4466 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:09.795000 audit[4466]: CRED_ACQ pid=4466 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:09.953274 sshd[4464]: pam_unix(sshd:session): session closed for user core May 10 00:44:09.952000 audit[4464]: USER_END pid=4464 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:09.955941 systemd[1]: sshd@14-10.0.0.88:22-10.0.0.1:53824.service: Deactivated successfully. May 10 00:44:09.956864 systemd[1]: session-15.scope: Deactivated successfully. May 10 00:44:09.957852 systemd-logind[1191]: Session 15 logged out. Waiting for processes to exit. May 10 00:44:09.958640 systemd-logind[1191]: Removed session 15. May 10 00:44:09.952000 audit[4464]: CRED_DISP pid=4464 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:09.963478 kernel: audit: type=1106 audit(1746837849.952:1408): pid=4464 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:09.963541 kernel: audit: type=1104 audit(1746837849.952:1409): pid=4464 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:09.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.88:22-10.0.0.1:53824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:10.297000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:10.297000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:10.297000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00305b350 a2=fc6 a3=0 items=0 ppid=1675 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 key=(null) May 10 00:44:10.297000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018dc140 a2=fc6 a3=0 items=0 ppid=1675 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 key=(null) May 10 00:44:10.297000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:10.297000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:10.507000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:10.507000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:10.507000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:10.507000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c007438300 a2=fc6 a3=0 items=0 ppid=1683 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 key=(null) May 10 00:44:10.507000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c005e1a690 a2=fc6 a3=0 items=0 ppid=1683 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 key=(null) May 10 00:44:10.507000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0057ab050 a2=fc6 a3=0 items=0 ppid=1683 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 key=(null) May 10 00:44:10.507000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3838002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:44:10.507000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3838002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:44:10.507000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3838002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:44:10.507000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:10.507000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c005e1a6c0 a2=fc6 a3=0 items=0 ppid=1683 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 key=(null) May 10 00:44:10.507000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3838002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:44:10.511000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:10.511000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c005f3e630 a2=fc6 a3=0 items=0 ppid=1683 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 key=(null) May 10 00:44:10.511000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3838002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:44:10.519000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:10.519000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c007668de0 a2=fc6 a3=0 items=0 ppid=1683 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c431,c652 key=(null) May 10 00:44:10.519000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3838002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 10 00:44:12.729701 env[1202]: time="2025-05-10T00:44:12.729645605Z" level=info msg="StopPodSandbox for \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\"" May 10 00:44:12.821935 env[1202]: 2025-05-10 00:44:12.777 [WARNING][4497] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--kzprd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b7f06332-7253-4fd1-8fe2-c3b993295a9a", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de", Pod:"csi-node-driver-kzprd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali18773b98bdb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:12.821935 env[1202]: 2025-05-10 00:44:12.777 [INFO][4497] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" May 10 00:44:12.821935 env[1202]: 2025-05-10 00:44:12.778 [INFO][4497] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" iface="eth0" netns="" May 10 00:44:12.821935 env[1202]: 2025-05-10 00:44:12.778 [INFO][4497] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" May 10 00:44:12.821935 env[1202]: 2025-05-10 00:44:12.778 [INFO][4497] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" May 10 00:44:12.821935 env[1202]: 2025-05-10 00:44:12.809 [INFO][4507] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" HandleID="k8s-pod-network.bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" Workload="localhost-k8s-csi--node--driver--kzprd-eth0" May 10 00:44:12.821935 env[1202]: 2025-05-10 00:44:12.809 [INFO][4507] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:12.821935 env[1202]: 2025-05-10 00:44:12.809 [INFO][4507] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:12.821935 env[1202]: 2025-05-10 00:44:12.816 [WARNING][4507] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" HandleID="k8s-pod-network.bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" Workload="localhost-k8s-csi--node--driver--kzprd-eth0" May 10 00:44:12.821935 env[1202]: 2025-05-10 00:44:12.816 [INFO][4507] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" HandleID="k8s-pod-network.bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" Workload="localhost-k8s-csi--node--driver--kzprd-eth0" May 10 00:44:12.821935 env[1202]: 2025-05-10 00:44:12.818 [INFO][4507] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:12.821935 env[1202]: 2025-05-10 00:44:12.820 [INFO][4497] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" May 10 00:44:12.822522 env[1202]: time="2025-05-10T00:44:12.821977714Z" level=info msg="TearDown network for sandbox \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\" successfully" May 10 00:44:12.822522 env[1202]: time="2025-05-10T00:44:12.822022648Z" level=info msg="StopPodSandbox for \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\" returns successfully" May 10 00:44:12.822764 env[1202]: time="2025-05-10T00:44:12.822712543Z" level=info msg="RemovePodSandbox for \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\"" May 10 00:44:12.822818 env[1202]: time="2025-05-10T00:44:12.822776543Z" level=info msg="Forcibly stopping sandbox \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\"" May 10 00:44:12.907747 env[1202]: 2025-05-10 00:44:12.859 [WARNING][4531] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--kzprd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b7f06332-7253-4fd1-8fe2-c3b993295a9a", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a3f85416c76f7509b5142833753203f4c702aab2073679d3f131b5a09b0d40de", Pod:"csi-node-driver-kzprd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali18773b98bdb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:12.907747 env[1202]: 2025-05-10 00:44:12.860 [INFO][4531] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" May 10 00:44:12.907747 env[1202]: 2025-05-10 00:44:12.860 [INFO][4531] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" iface="eth0" netns="" May 10 00:44:12.907747 env[1202]: 2025-05-10 00:44:12.860 [INFO][4531] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" May 10 00:44:12.907747 env[1202]: 2025-05-10 00:44:12.860 [INFO][4531] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" May 10 00:44:12.907747 env[1202]: 2025-05-10 00:44:12.890 [INFO][4540] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" HandleID="k8s-pod-network.bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" Workload="localhost-k8s-csi--node--driver--kzprd-eth0" May 10 00:44:12.907747 env[1202]: 2025-05-10 00:44:12.890 [INFO][4540] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:12.907747 env[1202]: 2025-05-10 00:44:12.891 [INFO][4540] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:12.907747 env[1202]: 2025-05-10 00:44:12.899 [WARNING][4540] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" HandleID="k8s-pod-network.bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" Workload="localhost-k8s-csi--node--driver--kzprd-eth0" May 10 00:44:12.907747 env[1202]: 2025-05-10 00:44:12.899 [INFO][4540] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" HandleID="k8s-pod-network.bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" Workload="localhost-k8s-csi--node--driver--kzprd-eth0" May 10 00:44:12.907747 env[1202]: 2025-05-10 00:44:12.901 [INFO][4540] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:12.907747 env[1202]: 2025-05-10 00:44:12.906 [INFO][4531] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8" May 10 00:44:12.908296 env[1202]: time="2025-05-10T00:44:12.907776472Z" level=info msg="TearDown network for sandbox \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\" successfully" May 10 00:44:12.911614 env[1202]: time="2025-05-10T00:44:12.911585030Z" level=info msg="RemovePodSandbox \"bf2aed377c60d330096f0cbc77fa626fd2ddf6aa886986681a939dc833f4cfd8\" returns successfully" May 10 00:44:12.912423 env[1202]: time="2025-05-10T00:44:12.912335799Z" level=info msg="StopPodSandbox for \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\"" May 10 00:44:12.983981 env[1202]: 2025-05-10 00:44:12.947 [WARNING][4563] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0", GenerateName:"calico-apiserver-7c5689859f-", Namespace:"calico-apiserver", SelfLink:"", UID:"e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c5689859f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561", Pod:"calico-apiserver-7c5689859f-kwbfr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali04f5dee0955", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:12.983981 env[1202]: 2025-05-10 00:44:12.947 [INFO][4563] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" May 10 00:44:12.983981 env[1202]: 2025-05-10 00:44:12.947 [INFO][4563] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" iface="eth0" netns="" May 10 00:44:12.983981 env[1202]: 2025-05-10 00:44:12.947 [INFO][4563] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" May 10 00:44:12.983981 env[1202]: 2025-05-10 00:44:12.947 [INFO][4563] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" May 10 00:44:12.983981 env[1202]: 2025-05-10 00:44:12.973 [INFO][4571] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" HandleID="k8s-pod-network.0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" Workload="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" May 10 00:44:12.983981 env[1202]: 2025-05-10 00:44:12.973 [INFO][4571] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:12.983981 env[1202]: 2025-05-10 00:44:12.973 [INFO][4571] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:12.983981 env[1202]: 2025-05-10 00:44:12.979 [WARNING][4571] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" HandleID="k8s-pod-network.0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" Workload="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" May 10 00:44:12.983981 env[1202]: 2025-05-10 00:44:12.979 [INFO][4571] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" HandleID="k8s-pod-network.0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" Workload="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" May 10 00:44:12.983981 env[1202]: 2025-05-10 00:44:12.980 [INFO][4571] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:12.983981 env[1202]: 2025-05-10 00:44:12.982 [INFO][4563] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" May 10 00:44:12.983981 env[1202]: time="2025-05-10T00:44:12.983944023Z" level=info msg="TearDown network for sandbox \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\" successfully" May 10 00:44:12.983981 env[1202]: time="2025-05-10T00:44:12.983978399Z" level=info msg="StopPodSandbox for \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\" returns successfully" May 10 00:44:12.984483 env[1202]: time="2025-05-10T00:44:12.984446907Z" level=info msg="RemovePodSandbox for \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\"" May 10 00:44:12.984509 env[1202]: time="2025-05-10T00:44:12.984474980Z" level=info msg="Forcibly stopping sandbox \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\"" May 10 00:44:13.061073 env[1202]: 2025-05-10 00:44:13.021 [WARNING][4595] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0", GenerateName:"calico-apiserver-7c5689859f-", Namespace:"calico-apiserver", SelfLink:"", UID:"e1ab1f44-27b3-46b9-a7e4-77683e1e7dd6", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c5689859f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b9c7642f5babb302858cc463d5a1715cae2292de5eb76532232892095f257561", Pod:"calico-apiserver-7c5689859f-kwbfr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali04f5dee0955", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:13.061073 env[1202]: 2025-05-10 00:44:13.021 [INFO][4595] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" May 10 00:44:13.061073 env[1202]: 2025-05-10 00:44:13.022 [INFO][4595] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" iface="eth0" netns="" May 10 00:44:13.061073 env[1202]: 2025-05-10 00:44:13.022 [INFO][4595] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" May 10 00:44:13.061073 env[1202]: 2025-05-10 00:44:13.022 [INFO][4595] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" May 10 00:44:13.061073 env[1202]: 2025-05-10 00:44:13.047 [INFO][4604] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" HandleID="k8s-pod-network.0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" Workload="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" May 10 00:44:13.061073 env[1202]: 2025-05-10 00:44:13.048 [INFO][4604] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:13.061073 env[1202]: 2025-05-10 00:44:13.048 [INFO][4604] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:13.061073 env[1202]: 2025-05-10 00:44:13.053 [WARNING][4604] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" HandleID="k8s-pod-network.0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" Workload="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" May 10 00:44:13.061073 env[1202]: 2025-05-10 00:44:13.053 [INFO][4604] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" HandleID="k8s-pod-network.0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" Workload="localhost-k8s-calico--apiserver--7c5689859f--kwbfr-eth0" May 10 00:44:13.061073 env[1202]: 2025-05-10 00:44:13.056 [INFO][4604] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:13.061073 env[1202]: 2025-05-10 00:44:13.059 [INFO][4595] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c" May 10 00:44:13.062005 env[1202]: time="2025-05-10T00:44:13.061111969Z" level=info msg="TearDown network for sandbox \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\" successfully" May 10 00:44:13.065298 env[1202]: time="2025-05-10T00:44:13.065248542Z" level=info msg="RemovePodSandbox \"0cc17dfd71bce399d3f0546ba7247c336b5ceabdd55b2426bd351da7f6ba4c6c\" returns successfully" May 10 00:44:13.065966 env[1202]: time="2025-05-10T00:44:13.065914843Z" level=info msg="StopPodSandbox for \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\"" May 10 00:44:13.148707 env[1202]: 2025-05-10 00:44:13.105 [WARNING][4626] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0", GenerateName:"calico-kube-controllers-564c889779-", Namespace:"calico-system", SelfLink:"", UID:"7ecea60d-bb21-4a1a-9b83-d60da1b2b52e", ResourceVersion:"992", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"564c889779", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de", Pod:"calico-kube-controllers-564c889779-cshdq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicd09dc5b0e0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:13.148707 env[1202]: 2025-05-10 00:44:13.105 [INFO][4626] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" May 10 00:44:13.148707 env[1202]: 2025-05-10 00:44:13.105 [INFO][4626] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" iface="eth0" netns="" May 10 00:44:13.148707 env[1202]: 2025-05-10 00:44:13.105 [INFO][4626] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" May 10 00:44:13.148707 env[1202]: 2025-05-10 00:44:13.105 [INFO][4626] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" May 10 00:44:13.148707 env[1202]: 2025-05-10 00:44:13.133 [INFO][4634] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" HandleID="k8s-pod-network.eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" Workload="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" May 10 00:44:13.148707 env[1202]: 2025-05-10 00:44:13.133 [INFO][4634] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:13.148707 env[1202]: 2025-05-10 00:44:13.133 [INFO][4634] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:13.148707 env[1202]: 2025-05-10 00:44:13.139 [WARNING][4634] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" HandleID="k8s-pod-network.eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" Workload="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" May 10 00:44:13.148707 env[1202]: 2025-05-10 00:44:13.139 [INFO][4634] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" HandleID="k8s-pod-network.eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" Workload="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" May 10 00:44:13.148707 env[1202]: 2025-05-10 00:44:13.142 [INFO][4634] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:13.148707 env[1202]: 2025-05-10 00:44:13.144 [INFO][4626] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" May 10 00:44:13.149342 env[1202]: time="2025-05-10T00:44:13.148748640Z" level=info msg="TearDown network for sandbox \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\" successfully" May 10 00:44:13.149342 env[1202]: time="2025-05-10T00:44:13.148783796Z" level=info msg="StopPodSandbox for \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\" returns successfully" May 10 00:44:13.149596 env[1202]: time="2025-05-10T00:44:13.149524056Z" level=info msg="RemovePodSandbox for \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\"" May 10 00:44:13.149665 env[1202]: time="2025-05-10T00:44:13.149609165Z" level=info msg="Forcibly stopping sandbox \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\"" May 10 00:44:13.223024 env[1202]: 2025-05-10 00:44:13.188 [WARNING][4657] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0", GenerateName:"calico-kube-controllers-564c889779-", Namespace:"calico-system", SelfLink:"", UID:"7ecea60d-bb21-4a1a-9b83-d60da1b2b52e", ResourceVersion:"992", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"564c889779", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"240abc7a32f6bf8a177fbdf15ecf0b56483b41d3edc86185574ace54726b31de", Pod:"calico-kube-controllers-564c889779-cshdq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicd09dc5b0e0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:13.223024 env[1202]: 2025-05-10 00:44:13.188 [INFO][4657] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" May 10 00:44:13.223024 env[1202]: 2025-05-10 00:44:13.189 [INFO][4657] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" iface="eth0" netns="" May 10 00:44:13.223024 env[1202]: 2025-05-10 00:44:13.189 [INFO][4657] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" May 10 00:44:13.223024 env[1202]: 2025-05-10 00:44:13.189 [INFO][4657] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" May 10 00:44:13.223024 env[1202]: 2025-05-10 00:44:13.211 [INFO][4665] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" HandleID="k8s-pod-network.eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" Workload="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" May 10 00:44:13.223024 env[1202]: 2025-05-10 00:44:13.211 [INFO][4665] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:13.223024 env[1202]: 2025-05-10 00:44:13.211 [INFO][4665] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:13.223024 env[1202]: 2025-05-10 00:44:13.217 [WARNING][4665] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" HandleID="k8s-pod-network.eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" Workload="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" May 10 00:44:13.223024 env[1202]: 2025-05-10 00:44:13.217 [INFO][4665] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" HandleID="k8s-pod-network.eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" Workload="localhost-k8s-calico--kube--controllers--564c889779--cshdq-eth0" May 10 00:44:13.223024 env[1202]: 2025-05-10 00:44:13.219 [INFO][4665] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:13.223024 env[1202]: 2025-05-10 00:44:13.221 [INFO][4657] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9" May 10 00:44:13.223638 env[1202]: time="2025-05-10T00:44:13.223053431Z" level=info msg="TearDown network for sandbox \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\" successfully" May 10 00:44:13.249000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:13.249000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018dd0e0 a2=fc6 a3=0 items=0 ppid=1675 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 key=(null) May 10 00:44:13.249000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:13.249000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:13.249000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:13.249000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002c46fe0 a2=fc6 a3=0 items=0 ppid=1675 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 key=(null) May 10 00:44:13.249000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:13.249000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003051fa0 a2=fc6 a3=0 items=0 ppid=1675 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 key=(null) May 10 00:44:13.249000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:13.250000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:13.250000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b001e0 a2=fc6 a3=0 items=0 ppid=1675 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c486 key=(null) May 10 00:44:13.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:13.401574 env[1202]: time="2025-05-10T00:44:13.401495950Z" level=info msg="RemovePodSandbox \"eb5adc102048a45e3844c1b8539a2aefc1cbd3c141a4d33f968dede316794ad9\" returns successfully" May 10 00:44:13.402233 env[1202]: time="2025-05-10T00:44:13.402185926Z" level=info msg="StopPodSandbox for \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\"" May 10 00:44:13.476791 env[1202]: 2025-05-10 00:44:13.441 [WARNING][4688] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"d9cc7394-13d8-4c39-a526-a2a634d11caf", ResourceVersion:"869", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc", Pod:"coredns-668d6bf9bc-bvxzp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieef2269faec", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:13.476791 env[1202]: 2025-05-10 00:44:13.442 [INFO][4688] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" May 10 00:44:13.476791 env[1202]: 2025-05-10 00:44:13.442 [INFO][4688] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" iface="eth0" netns="" May 10 00:44:13.476791 env[1202]: 2025-05-10 00:44:13.442 [INFO][4688] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" May 10 00:44:13.476791 env[1202]: 2025-05-10 00:44:13.442 [INFO][4688] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" May 10 00:44:13.476791 env[1202]: 2025-05-10 00:44:13.464 [INFO][4697] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" HandleID="k8s-pod-network.24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" Workload="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" May 10 00:44:13.476791 env[1202]: 2025-05-10 00:44:13.464 [INFO][4697] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:13.476791 env[1202]: 2025-05-10 00:44:13.464 [INFO][4697] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:13.476791 env[1202]: 2025-05-10 00:44:13.471 [WARNING][4697] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" HandleID="k8s-pod-network.24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" Workload="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" May 10 00:44:13.476791 env[1202]: 2025-05-10 00:44:13.471 [INFO][4697] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" HandleID="k8s-pod-network.24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" Workload="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" May 10 00:44:13.476791 env[1202]: 2025-05-10 00:44:13.472 [INFO][4697] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:13.476791 env[1202]: 2025-05-10 00:44:13.474 [INFO][4688] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" May 10 00:44:13.477450 env[1202]: time="2025-05-10T00:44:13.476823060Z" level=info msg="TearDown network for sandbox \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\" successfully" May 10 00:44:13.477450 env[1202]: time="2025-05-10T00:44:13.476861583Z" level=info msg="StopPodSandbox for \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\" returns successfully" May 10 00:44:13.477515 env[1202]: time="2025-05-10T00:44:13.477445789Z" level=info msg="RemovePodSandbox for \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\"" May 10 00:44:13.477515 env[1202]: time="2025-05-10T00:44:13.477482778Z" level=info msg="Forcibly stopping sandbox \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\"" May 10 00:44:13.543501 env[1202]: 2025-05-10 00:44:13.514 [WARNING][4719] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"d9cc7394-13d8-4c39-a526-a2a634d11caf", ResourceVersion:"869", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"deb553543f0bbb93203786463e8593a6d9fe55f7241d84aebc6d45a509d2bbbc", Pod:"coredns-668d6bf9bc-bvxzp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieef2269faec", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:13.543501 env[1202]: 2025-05-10 00:44:13.514 [INFO][4719] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" May 10 00:44:13.543501 env[1202]: 2025-05-10 00:44:13.514 [INFO][4719] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" iface="eth0" netns="" May 10 00:44:13.543501 env[1202]: 2025-05-10 00:44:13.514 [INFO][4719] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" May 10 00:44:13.543501 env[1202]: 2025-05-10 00:44:13.514 [INFO][4719] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" May 10 00:44:13.543501 env[1202]: 2025-05-10 00:44:13.532 [INFO][4727] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" HandleID="k8s-pod-network.24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" Workload="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" May 10 00:44:13.543501 env[1202]: 2025-05-10 00:44:13.532 [INFO][4727] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:13.543501 env[1202]: 2025-05-10 00:44:13.533 [INFO][4727] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:13.543501 env[1202]: 2025-05-10 00:44:13.538 [WARNING][4727] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" HandleID="k8s-pod-network.24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" Workload="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" May 10 00:44:13.543501 env[1202]: 2025-05-10 00:44:13.538 [INFO][4727] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" HandleID="k8s-pod-network.24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" Workload="localhost-k8s-coredns--668d6bf9bc--bvxzp-eth0" May 10 00:44:13.543501 env[1202]: 2025-05-10 00:44:13.540 [INFO][4727] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:13.543501 env[1202]: 2025-05-10 00:44:13.541 [INFO][4719] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818" May 10 00:44:13.543501 env[1202]: time="2025-05-10T00:44:13.543452586Z" level=info msg="TearDown network for sandbox \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\" successfully" May 10 00:44:13.547303 env[1202]: time="2025-05-10T00:44:13.547256565Z" level=info msg="RemovePodSandbox \"24b5cbee47b75503474fcdf525310bd8bb174f132fdb5a0f05a402cf8070f818\" returns successfully" May 10 00:44:13.547842 env[1202]: time="2025-05-10T00:44:13.547818970Z" level=info msg="StopPodSandbox for \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\"" May 10 00:44:13.612066 env[1202]: 2025-05-10 00:44:13.576 [WARNING][4749] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"cb7ed29e-de46-4390-9af6-2667bd2e5356", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc", Pod:"coredns-668d6bf9bc-tqt8t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif83bd6f6055", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:13.612066 env[1202]: 2025-05-10 00:44:13.577 [INFO][4749] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" May 10 00:44:13.612066 env[1202]: 2025-05-10 00:44:13.577 [INFO][4749] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" iface="eth0" netns="" May 10 00:44:13.612066 env[1202]: 2025-05-10 00:44:13.577 [INFO][4749] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" May 10 00:44:13.612066 env[1202]: 2025-05-10 00:44:13.577 [INFO][4749] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" May 10 00:44:13.612066 env[1202]: 2025-05-10 00:44:13.600 [INFO][4758] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" HandleID="k8s-pod-network.2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" Workload="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" May 10 00:44:13.612066 env[1202]: 2025-05-10 00:44:13.601 [INFO][4758] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:13.612066 env[1202]: 2025-05-10 00:44:13.601 [INFO][4758] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:13.612066 env[1202]: 2025-05-10 00:44:13.607 [WARNING][4758] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" HandleID="k8s-pod-network.2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" Workload="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" May 10 00:44:13.612066 env[1202]: 2025-05-10 00:44:13.607 [INFO][4758] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" HandleID="k8s-pod-network.2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" Workload="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" May 10 00:44:13.612066 env[1202]: 2025-05-10 00:44:13.608 [INFO][4758] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:13.612066 env[1202]: 2025-05-10 00:44:13.610 [INFO][4749] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" May 10 00:44:13.612764 env[1202]: time="2025-05-10T00:44:13.612100420Z" level=info msg="TearDown network for sandbox \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\" successfully" May 10 00:44:13.612764 env[1202]: time="2025-05-10T00:44:13.612134764Z" level=info msg="StopPodSandbox for \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\" returns successfully" May 10 00:44:13.612764 env[1202]: time="2025-05-10T00:44:13.612668066Z" level=info msg="RemovePodSandbox for \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\"" May 10 00:44:13.612764 env[1202]: time="2025-05-10T00:44:13.612707369Z" level=info msg="Forcibly stopping sandbox \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\"" May 10 00:44:13.677502 env[1202]: 2025-05-10 00:44:13.644 [WARNING][4781] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"cb7ed29e-de46-4390-9af6-2667bd2e5356", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"af7ea1f217e70a1baf71c72a05fe433936c4494a3335894fa45e784beb42e7fc", Pod:"coredns-668d6bf9bc-tqt8t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif83bd6f6055", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:13.677502 env[1202]: 2025-05-10 00:44:13.645 [INFO][4781] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" May 10 00:44:13.677502 env[1202]: 2025-05-10 00:44:13.645 [INFO][4781] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" iface="eth0" netns="" May 10 00:44:13.677502 env[1202]: 2025-05-10 00:44:13.645 [INFO][4781] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" May 10 00:44:13.677502 env[1202]: 2025-05-10 00:44:13.645 [INFO][4781] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" May 10 00:44:13.677502 env[1202]: 2025-05-10 00:44:13.667 [INFO][4789] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" HandleID="k8s-pod-network.2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" Workload="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" May 10 00:44:13.677502 env[1202]: 2025-05-10 00:44:13.667 [INFO][4789] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:13.677502 env[1202]: 2025-05-10 00:44:13.667 [INFO][4789] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:13.677502 env[1202]: 2025-05-10 00:44:13.673 [WARNING][4789] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" HandleID="k8s-pod-network.2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" Workload="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" May 10 00:44:13.677502 env[1202]: 2025-05-10 00:44:13.673 [INFO][4789] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" HandleID="k8s-pod-network.2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" Workload="localhost-k8s-coredns--668d6bf9bc--tqt8t-eth0" May 10 00:44:13.677502 env[1202]: 2025-05-10 00:44:13.674 [INFO][4789] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:13.677502 env[1202]: 2025-05-10 00:44:13.676 [INFO][4781] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826" May 10 00:44:13.678235 env[1202]: time="2025-05-10T00:44:13.677519756Z" level=info msg="TearDown network for sandbox \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\" successfully" May 10 00:44:13.681149 env[1202]: time="2025-05-10T00:44:13.681122086Z" level=info msg="RemovePodSandbox \"2f5fcf10cb7de44c6a13b0a5b397f22478b941c2033efbd5814f82bc97411826\" returns successfully" May 10 00:44:13.681721 env[1202]: time="2025-05-10T00:44:13.681693098Z" level=info msg="StopPodSandbox for \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\"" May 10 00:44:13.746782 env[1202]: 2025-05-10 00:44:13.713 [WARNING][4811] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0", GenerateName:"calico-apiserver-7c5689859f-", Namespace:"calico-apiserver", SelfLink:"", UID:"43a0790b-1277-4d8d-9090-56e515ec4483", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c5689859f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3", Pod:"calico-apiserver-7c5689859f-l879k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4531eda25b3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:13.746782 env[1202]: 2025-05-10 00:44:13.713 [INFO][4811] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" May 10 00:44:13.746782 env[1202]: 2025-05-10 00:44:13.713 [INFO][4811] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" iface="eth0" netns="" May 10 00:44:13.746782 env[1202]: 2025-05-10 00:44:13.713 [INFO][4811] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" May 10 00:44:13.746782 env[1202]: 2025-05-10 00:44:13.713 [INFO][4811] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" May 10 00:44:13.746782 env[1202]: 2025-05-10 00:44:13.736 [INFO][4820] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" HandleID="k8s-pod-network.e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" Workload="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" May 10 00:44:13.746782 env[1202]: 2025-05-10 00:44:13.736 [INFO][4820] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:13.746782 env[1202]: 2025-05-10 00:44:13.736 [INFO][4820] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:13.746782 env[1202]: 2025-05-10 00:44:13.742 [WARNING][4820] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" HandleID="k8s-pod-network.e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" Workload="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" May 10 00:44:13.746782 env[1202]: 2025-05-10 00:44:13.742 [INFO][4820] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" HandleID="k8s-pod-network.e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" Workload="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" May 10 00:44:13.746782 env[1202]: 2025-05-10 00:44:13.743 [INFO][4820] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:13.746782 env[1202]: 2025-05-10 00:44:13.745 [INFO][4811] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" May 10 00:44:13.747667 env[1202]: time="2025-05-10T00:44:13.746819673Z" level=info msg="TearDown network for sandbox \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\" successfully" May 10 00:44:13.747667 env[1202]: time="2025-05-10T00:44:13.746861221Z" level=info msg="StopPodSandbox for \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\" returns successfully" May 10 00:44:13.747667 env[1202]: time="2025-05-10T00:44:13.747342374Z" level=info msg="RemovePodSandbox for \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\"" May 10 00:44:13.747667 env[1202]: time="2025-05-10T00:44:13.747380616Z" level=info msg="Forcibly stopping sandbox \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\"" May 10 00:44:13.807988 env[1202]: 2025-05-10 00:44:13.780 [WARNING][4844] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0", GenerateName:"calico-apiserver-7c5689859f-", Namespace:"calico-apiserver", SelfLink:"", UID:"43a0790b-1277-4d8d-9090-56e515ec4483", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 43, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c5689859f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"da7b1bd318785c20d84dd134583c3053a24eb117277a05a464c846e4a74da6f3", Pod:"calico-apiserver-7c5689859f-l879k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4531eda25b3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:44:13.807988 env[1202]: 2025-05-10 00:44:13.780 [INFO][4844] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" May 10 00:44:13.807988 env[1202]: 2025-05-10 00:44:13.780 [INFO][4844] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" iface="eth0" netns="" May 10 00:44:13.807988 env[1202]: 2025-05-10 00:44:13.780 [INFO][4844] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" May 10 00:44:13.807988 env[1202]: 2025-05-10 00:44:13.780 [INFO][4844] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" May 10 00:44:13.807988 env[1202]: 2025-05-10 00:44:13.797 [INFO][4853] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" HandleID="k8s-pod-network.e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" Workload="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" May 10 00:44:13.807988 env[1202]: 2025-05-10 00:44:13.797 [INFO][4853] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:44:13.807988 env[1202]: 2025-05-10 00:44:13.797 [INFO][4853] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:44:13.807988 env[1202]: 2025-05-10 00:44:13.803 [WARNING][4853] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" HandleID="k8s-pod-network.e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" Workload="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" May 10 00:44:13.807988 env[1202]: 2025-05-10 00:44:13.803 [INFO][4853] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" HandleID="k8s-pod-network.e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" Workload="localhost-k8s-calico--apiserver--7c5689859f--l879k-eth0" May 10 00:44:13.807988 env[1202]: 2025-05-10 00:44:13.804 [INFO][4853] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:44:13.807988 env[1202]: 2025-05-10 00:44:13.806 [INFO][4844] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155" May 10 00:44:13.807988 env[1202]: time="2025-05-10T00:44:13.807924881Z" level=info msg="TearDown network for sandbox \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\" successfully" May 10 00:44:13.812330 env[1202]: time="2025-05-10T00:44:13.812300053Z" level=info msg="RemovePodSandbox \"e2ca6f168762896cced13db430e7d4dbb33e1160b1cfb03bac345d15c4498155\" returns successfully" May 10 00:44:14.959808 systemd[1]: Started sshd@15-10.0.0.88:22-10.0.0.1:53826.service. May 10 00:44:14.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.88:22-10.0.0.1:53826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.961227 kernel: kauditd_printk_skb: 37 callbacks suppressed May 10 00:44:14.961361 kernel: audit: type=1130 audit(1746837854.958:1423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.88:22-10.0.0.1:53826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:15.004000 audit[4861]: USER_ACCT pid=4861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:15.006623 sshd[4861]: Accepted publickey for core from 10.0.0.1 port 53826 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:44:15.009000 audit[4861]: CRED_ACQ pid=4861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:15.011897 sshd[4861]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:15.015626 kernel: audit: type=1101 audit(1746837855.004:1424): pid=4861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:15.015683 kernel: audit: type=1103 audit(1746837855.009:1425): pid=4861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:15.015704 kernel: audit: type=1006 audit(1746837855.009:1426): pid=4861 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 10 00:44:15.015979 systemd-logind[1191]: New session 16 of user core. May 10 00:44:15.017269 systemd[1]: Started session-16.scope. May 10 00:44:15.009000 audit[4861]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3a6656d0 a2=3 a3=0 items=0 ppid=1 pid=4861 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:15.022772 kernel: audit: type=1300 audit(1746837855.009:1426): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3a6656d0 a2=3 a3=0 items=0 ppid=1 pid=4861 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:15.022847 kernel: audit: type=1327 audit(1746837855.009:1426): proctitle=737368643A20636F7265205B707269765D May 10 00:44:15.009000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:15.020000 audit[4861]: USER_START pid=4861 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:15.028643 kernel: audit: type=1105 audit(1746837855.020:1427): pid=4861 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:15.028697 kernel: audit: type=1103 audit(1746837855.022:1428): pid=4863 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:15.022000 audit[4863]: CRED_ACQ pid=4863 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:15.165783 sshd[4861]: pam_unix(sshd:session): session closed for user core May 10 00:44:15.165000 audit[4861]: USER_END pid=4861 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:15.168430 systemd[1]: sshd@15-10.0.0.88:22-10.0.0.1:53826.service: Deactivated successfully. May 10 00:44:15.169346 systemd[1]: session-16.scope: Deactivated successfully. May 10 00:44:15.170113 systemd-logind[1191]: Session 16 logged out. Waiting for processes to exit. May 10 00:44:15.171000 systemd-logind[1191]: Removed session 16. May 10 00:44:15.165000 audit[4861]: CRED_DISP pid=4861 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:15.175689 kernel: audit: type=1106 audit(1746837855.165:1429): pid=4861 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:15.175794 kernel: audit: type=1104 audit(1746837855.165:1430): pid=4861 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:15.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.88:22-10.0.0.1:53826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:20.170373 systemd[1]: Started sshd@16-10.0.0.88:22-10.0.0.1:47108.service. May 10 00:44:20.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.88:22-10.0.0.1:47108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:20.171440 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:44:20.171508 kernel: audit: type=1130 audit(1746837860.168:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.88:22-10.0.0.1:47108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:20.208000 audit[4907]: USER_ACCT pid=4907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:20.210164 sshd[4907]: Accepted publickey for core from 10.0.0.1 port 47108 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:44:20.212335 sshd[4907]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:20.210000 audit[4907]: CRED_ACQ pid=4907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:20.216326 systemd-logind[1191]: New session 17 of user core. May 10 00:44:20.217133 systemd[1]: Started session-17.scope. May 10 00:44:20.218268 kernel: audit: type=1101 audit(1746837860.208:1433): pid=4907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:20.218345 kernel: audit: type=1103 audit(1746837860.210:1434): pid=4907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:20.218370 kernel: audit: type=1006 audit(1746837860.210:1435): pid=4907 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 10 00:44:20.220975 kernel: audit: type=1300 audit(1746837860.210:1435): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8edef100 a2=3 a3=0 items=0 ppid=1 pid=4907 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.210000 audit[4907]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8edef100 a2=3 a3=0 items=0 ppid=1 pid=4907 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:20.225387 kernel: audit: type=1327 audit(1746837860.210:1435): proctitle=737368643A20636F7265205B707269765D May 10 00:44:20.210000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:20.226833 kernel: audit: type=1105 audit(1746837860.220:1436): pid=4907 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:20.220000 audit[4907]: USER_START pid=4907 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:20.231701 kernel: audit: type=1103 audit(1746837860.221:1437): pid=4909 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:20.221000 audit[4909]: CRED_ACQ pid=4909 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:20.342990 sshd[4907]: pam_unix(sshd:session): session closed for user core May 10 00:44:20.342000 audit[4907]: USER_END pid=4907 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:20.345491 systemd[1]: sshd@16-10.0.0.88:22-10.0.0.1:47108.service: Deactivated successfully. May 10 00:44:20.346267 systemd[1]: session-17.scope: Deactivated successfully. May 10 00:44:20.346842 systemd-logind[1191]: Session 17 logged out. Waiting for processes to exit. May 10 00:44:20.347563 systemd-logind[1191]: Removed session 17. May 10 00:44:20.342000 audit[4907]: CRED_DISP pid=4907 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:20.352857 kernel: audit: type=1106 audit(1746837860.342:1438): pid=4907 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:20.352914 kernel: audit: type=1104 audit(1746837860.342:1439): pid=4907 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:20.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.88:22-10.0.0.1:47108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:21.743152 kubelet[1947]: E0510 00:44:21.743087 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:44:23.508578 kubelet[1947]: I0510 00:44:23.508519 1947 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:44:23.548000 audit[4922]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4922 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:23.548000 audit[4922]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc40ae7730 a2=0 a3=7ffc40ae771c items=0 ppid=2096 pid=4922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:23.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:23.553000 audit[4922]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4922 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:23.553000 audit[4922]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc40ae7730 a2=0 a3=7ffc40ae771c items=0 ppid=2096 pid=4922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:23.553000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:23.742284 kubelet[1947]: E0510 00:44:23.742211 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:44:25.010480 systemd[1]: run-containerd-runc-k8s.io-c80e053f925aafe687f9d8929897d15075577a518dc6045b2b6edc0be0f1a991-runc.D9V1N5.mount: Deactivated successfully. May 10 00:44:25.059221 kubelet[1947]: E0510 00:44:25.059181 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:44:25.350340 systemd[1]: Started sshd@17-10.0.0.88:22-10.0.0.1:47110.service. May 10 00:44:25.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.88:22-10.0.0.1:47110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:25.352304 kernel: kauditd_printk_skb: 7 callbacks suppressed May 10 00:44:25.352692 kernel: audit: type=1130 audit(1746837865.350:1443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.88:22-10.0.0.1:47110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:25.393000 audit[4948]: USER_ACCT pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.404809 kernel: audit: type=1101 audit(1746837865.393:1444): pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.404867 kernel: audit: type=1103 audit(1746837865.395:1445): pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.395000 audit[4948]: CRED_ACQ pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.404962 sshd[4948]: Accepted publickey for core from 10.0.0.1 port 47110 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:44:25.396231 sshd[4948]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:25.402046 systemd[1]: Started session-18.scope. May 10 00:44:25.402463 systemd-logind[1191]: New session 18 of user core. May 10 00:44:25.395000 audit[4948]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5a1600a0 a2=3 a3=0 items=0 ppid=1 pid=4948 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:25.413401 kernel: audit: type=1006 audit(1746837865.395:1446): pid=4948 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 10 00:44:25.413473 kernel: audit: type=1300 audit(1746837865.395:1446): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5a1600a0 a2=3 a3=0 items=0 ppid=1 pid=4948 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:25.413505 kernel: audit: type=1327 audit(1746837865.395:1446): proctitle=737368643A20636F7265205B707269765D May 10 00:44:25.395000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:25.415030 kernel: audit: type=1105 audit(1746837865.408:1447): pid=4948 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.408000 audit[4948]: USER_START pid=4948 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.424127 kernel: audit: type=1103 audit(1746837865.409:1448): pid=4950 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.409000 audit[4950]: CRED_ACQ pid=4950 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.553271 sshd[4948]: pam_unix(sshd:session): session closed for user core May 10 00:44:25.553000 audit[4948]: USER_END pid=4948 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.557481 systemd[1]: sshd@17-10.0.0.88:22-10.0.0.1:47110.service: Deactivated successfully. May 10 00:44:25.558570 systemd[1]: session-18.scope: Deactivated successfully. May 10 00:44:25.554000 audit[4948]: CRED_DISP pid=4948 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.561007 systemd[1]: Started sshd@18-10.0.0.88:22-10.0.0.1:47118.service. May 10 00:44:25.562797 kernel: audit: type=1106 audit(1746837865.553:1449): pid=4948 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.562885 kernel: audit: type=1104 audit(1746837865.554:1450): pid=4948 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.88:22-10.0.0.1:47110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:25.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.88:22-10.0.0.1:47118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:25.564933 systemd-logind[1191]: Session 18 logged out. Waiting for processes to exit. May 10 00:44:25.565927 systemd-logind[1191]: Removed session 18. May 10 00:44:25.600000 audit[4961]: USER_ACCT pid=4961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.601763 sshd[4961]: Accepted publickey for core from 10.0.0.1 port 47118 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:44:25.602000 audit[4961]: CRED_ACQ pid=4961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.602000 audit[4961]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe82399830 a2=3 a3=0 items=0 ppid=1 pid=4961 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:25.602000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:25.603110 sshd[4961]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:25.606905 systemd-logind[1191]: New session 19 of user core. May 10 00:44:25.607704 systemd[1]: Started session-19.scope. May 10 00:44:25.612000 audit[4961]: USER_START pid=4961 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.613000 audit[4963]: CRED_ACQ pid=4963 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.919994 sshd[4961]: pam_unix(sshd:session): session closed for user core May 10 00:44:25.920000 audit[4961]: USER_END pid=4961 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.920000 audit[4961]: CRED_DISP pid=4961 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.924056 systemd[1]: Started sshd@19-10.0.0.88:22-10.0.0.1:47128.service. May 10 00:44:25.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.88:22-10.0.0.1:47128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:25.924813 systemd[1]: sshd@18-10.0.0.88:22-10.0.0.1:47118.service: Deactivated successfully. May 10 00:44:25.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.88:22-10.0.0.1:47118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:25.925613 systemd[1]: session-19.scope: Deactivated successfully. May 10 00:44:25.926496 systemd-logind[1191]: Session 19 logged out. Waiting for processes to exit. May 10 00:44:25.927738 systemd-logind[1191]: Removed session 19. May 10 00:44:25.964000 audit[4972]: USER_ACCT pid=4972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.965413 sshd[4972]: Accepted publickey for core from 10.0.0.1 port 47128 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:44:25.965000 audit[4972]: CRED_ACQ pid=4972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.965000 audit[4972]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5ba4a0a0 a2=3 a3=0 items=0 ppid=1 pid=4972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:25.965000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:25.966822 sshd[4972]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:25.972422 systemd[1]: Started session-20.scope. May 10 00:44:25.974316 systemd-logind[1191]: New session 20 of user core. May 10 00:44:25.981000 audit[4972]: USER_START pid=4972 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:25.982000 audit[4975]: CRED_ACQ pid=4975 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:26.720000 audit[4986]: NETFILTER_CFG table=filter:119 family=2 entries=20 op=nft_register_rule pid=4986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:26.720000 audit[4986]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdd80a5cf0 a2=0 a3=7ffdd80a5cdc items=0 ppid=2096 pid=4986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:26.720000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:26.725000 audit[4986]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=4986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:26.725000 audit[4986]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdd80a5cf0 a2=0 a3=0 items=0 ppid=2096 pid=4986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:26.725000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:26.727743 sshd[4972]: pam_unix(sshd:session): session closed for user core May 10 00:44:26.728000 audit[4972]: USER_END pid=4972 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:26.729000 audit[4972]: CRED_DISP pid=4972 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:26.731922 systemd[1]: Started sshd@20-10.0.0.88:22-10.0.0.1:48980.service. May 10 00:44:26.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.88:22-10.0.0.1:48980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:26.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.88:22-10.0.0.1:47128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:26.732429 systemd[1]: sshd@19-10.0.0.88:22-10.0.0.1:47128.service: Deactivated successfully. May 10 00:44:26.733103 systemd[1]: session-20.scope: Deactivated successfully. May 10 00:44:26.733746 systemd-logind[1191]: Session 20 logged out. Waiting for processes to exit. May 10 00:44:26.734716 systemd-logind[1191]: Removed session 20. May 10 00:44:26.740000 audit[4991]: NETFILTER_CFG table=filter:121 family=2 entries=32 op=nft_register_rule pid=4991 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:26.740000 audit[4991]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffce2f27980 a2=0 a3=7ffce2f2796c items=0 ppid=2096 pid=4991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:26.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:26.745000 audit[4991]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=4991 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:26.745000 audit[4991]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffce2f27980 a2=0 a3=0 items=0 ppid=2096 pid=4991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:26.745000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:26.767000 audit[4988]: USER_ACCT pid=4988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:26.768708 sshd[4988]: Accepted publickey for core from 10.0.0.1 port 48980 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:44:26.769000 audit[4988]: CRED_ACQ pid=4988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:26.769000 audit[4988]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff534aa540 a2=3 a3=0 items=0 ppid=1 pid=4988 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:26.769000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:26.769924 sshd[4988]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:26.778837 systemd[1]: Started session-21.scope. May 10 00:44:26.779196 systemd-logind[1191]: New session 21 of user core. May 10 00:44:26.785000 audit[4988]: USER_START pid=4988 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:26.787000 audit[4993]: CRED_ACQ pid=4993 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:27.082785 sshd[4988]: pam_unix(sshd:session): session closed for user core May 10 00:44:27.083000 audit[4988]: USER_END pid=4988 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:27.083000 audit[4988]: CRED_DISP pid=4988 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:27.086352 systemd[1]: sshd@20-10.0.0.88:22-10.0.0.1:48980.service: Deactivated successfully. May 10 00:44:27.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.88:22-10.0.0.1:48980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.087079 systemd[1]: session-21.scope: Deactivated successfully. May 10 00:44:27.087828 systemd-logind[1191]: Session 21 logged out. Waiting for processes to exit. May 10 00:44:27.089252 systemd[1]: Started sshd@21-10.0.0.88:22-10.0.0.1:48992.service. May 10 00:44:27.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.88:22-10.0.0.1:48992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.090740 systemd-logind[1191]: Removed session 21. May 10 00:44:27.129000 audit[5002]: USER_ACCT pid=5002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:27.130192 sshd[5002]: Accepted publickey for core from 10.0.0.1 port 48992 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:44:27.130000 audit[5002]: CRED_ACQ pid=5002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:27.130000 audit[5002]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3d5cf7c0 a2=3 a3=0 items=0 ppid=1 pid=5002 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:27.130000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:27.131910 sshd[5002]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:27.136380 systemd-logind[1191]: New session 22 of user core. May 10 00:44:27.137579 systemd[1]: Started session-22.scope. May 10 00:44:27.142000 audit[5002]: USER_START pid=5002 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:27.144000 audit[5004]: CRED_ACQ pid=5004 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:27.276712 sshd[5002]: pam_unix(sshd:session): session closed for user core May 10 00:44:27.277000 audit[5002]: USER_END pid=5002 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:27.277000 audit[5002]: CRED_DISP pid=5002 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:27.279852 systemd[1]: sshd@21-10.0.0.88:22-10.0.0.1:48992.service: Deactivated successfully. May 10 00:44:27.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.88:22-10.0.0.1:48992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:27.280935 systemd[1]: session-22.scope: Deactivated successfully. May 10 00:44:27.281678 systemd-logind[1191]: Session 22 logged out. Waiting for processes to exit. May 10 00:44:27.282756 systemd-logind[1191]: Removed session 22. May 10 00:44:29.742415 kubelet[1947]: E0510 00:44:29.742362 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:44:31.598957 kubelet[1947]: I0510 00:44:31.598869 1947 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:44:31.627000 audit[5015]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:31.629593 kernel: kauditd_printk_skb: 57 callbacks suppressed May 10 00:44:31.629677 kernel: audit: type=1325 audit(1746837871.627:1492): table=filter:123 family=2 entries=32 op=nft_register_rule pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:31.627000 audit[5015]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdbe58b2c0 a2=0 a3=7ffdbe58b2ac items=0 ppid=2096 pid=5015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.637838 kernel: audit: type=1300 audit(1746837871.627:1492): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdbe58b2c0 a2=0 a3=7ffdbe58b2ac items=0 ppid=2096 pid=5015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.637900 kernel: audit: type=1327 audit(1746837871.627:1492): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:31.627000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:31.642000 audit[5015]: NETFILTER_CFG table=nat:124 family=2 entries=34 op=nft_register_chain pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:31.642000 audit[5015]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdbe58b2c0 a2=0 a3=7ffdbe58b2ac items=0 ppid=2096 pid=5015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.651180 kernel: audit: type=1325 audit(1746837871.642:1493): table=nat:124 family=2 entries=34 op=nft_register_chain pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:31.651281 kernel: audit: type=1300 audit(1746837871.642:1493): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdbe58b2c0 a2=0 a3=7ffdbe58b2ac items=0 ppid=2096 pid=5015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.651300 kernel: audit: type=1327 audit(1746837871.642:1493): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:31.642000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:32.281531 systemd[1]: Started sshd@22-10.0.0.88:22-10.0.0.1:49000.service. May 10 00:44:32.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.88:22-10.0.0.1:49000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:32.286577 kernel: audit: type=1130 audit(1746837872.281:1494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.88:22-10.0.0.1:49000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:32.317000 audit[5017]: USER_ACCT pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:32.318623 sshd[5017]: Accepted publickey for core from 10.0.0.1 port 49000 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:44:32.322000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:32.323463 sshd[5017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:32.327189 kernel: audit: type=1101 audit(1746837872.317:1495): pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:32.327252 kernel: audit: type=1103 audit(1746837872.322:1496): pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:32.327323 kernel: audit: type=1006 audit(1746837872.322:1497): pid=5017 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 10 00:44:32.328212 systemd-logind[1191]: New session 23 of user core. May 10 00:44:32.329222 systemd[1]: Started session-23.scope. May 10 00:44:32.322000 audit[5017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4f901940 a2=3 a3=0 items=0 ppid=1 pid=5017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:32.322000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:32.334000 audit[5017]: USER_START pid=5017 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:32.336000 audit[5019]: CRED_ACQ pid=5019 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:32.437505 sshd[5017]: pam_unix(sshd:session): session closed for user core May 10 00:44:32.437000 audit[5017]: USER_END pid=5017 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:32.438000 audit[5017]: CRED_DISP pid=5017 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:32.440014 systemd[1]: sshd@22-10.0.0.88:22-10.0.0.1:49000.service: Deactivated successfully. May 10 00:44:32.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.88:22-10.0.0.1:49000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:32.440751 systemd[1]: session-23.scope: Deactivated successfully. May 10 00:44:32.441528 systemd-logind[1191]: Session 23 logged out. Waiting for processes to exit. May 10 00:44:32.442233 systemd-logind[1191]: Removed session 23. May 10 00:44:34.036000 audit[5030]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5030 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:34.036000 audit[5030]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd1c28d900 a2=0 a3=7ffd1c28d8ec items=0 ppid=2096 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:34.036000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:34.042000 audit[5030]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=5030 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:34.042000 audit[5030]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd1c28d900 a2=0 a3=7ffd1c28d8ec items=0 ppid=2096 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:34.042000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:37.441874 systemd[1]: Started sshd@23-10.0.0.88:22-10.0.0.1:50286.service. May 10 00:44:37.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.88:22-10.0.0.1:50286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:37.443618 kernel: kauditd_printk_skb: 13 callbacks suppressed May 10 00:44:37.443693 kernel: audit: type=1130 audit(1746837877.440:1505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.88:22-10.0.0.1:50286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:37.480000 audit[5059]: USER_ACCT pid=5059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.481940 sshd[5059]: Accepted publickey for core from 10.0.0.1 port 50286 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:44:37.483986 sshd[5059]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:37.482000 audit[5059]: CRED_ACQ pid=5059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.488688 systemd-logind[1191]: New session 24 of user core. May 10 00:44:37.489608 systemd[1]: Started session-24.scope. May 10 00:44:37.490464 kernel: audit: type=1101 audit(1746837877.480:1506): pid=5059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.490525 kernel: audit: type=1103 audit(1746837877.482:1507): pid=5059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.490568 kernel: audit: type=1006 audit(1746837877.482:1508): pid=5059 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 10 00:44:37.482000 audit[5059]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1216c090 a2=3 a3=0 items=0 ppid=1 pid=5059 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.497950 kernel: audit: type=1300 audit(1746837877.482:1508): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1216c090 a2=3 a3=0 items=0 ppid=1 pid=5059 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.498005 kernel: audit: type=1327 audit(1746837877.482:1508): proctitle=737368643A20636F7265205B707269765D May 10 00:44:37.482000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:37.492000 audit[5059]: USER_START pid=5059 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.504917 kernel: audit: type=1105 audit(1746837877.492:1509): pid=5059 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.504966 kernel: audit: type=1103 audit(1746837877.494:1510): pid=5061 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.494000 audit[5061]: CRED_ACQ pid=5061 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.621258 sshd[5059]: pam_unix(sshd:session): session closed for user core May 10 00:44:37.620000 audit[5059]: USER_END pid=5059 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.623970 systemd[1]: sshd@23-10.0.0.88:22-10.0.0.1:50286.service: Deactivated successfully. May 10 00:44:37.624937 systemd[1]: session-24.scope: Deactivated successfully. May 10 00:44:37.625683 systemd-logind[1191]: Session 24 logged out. Waiting for processes to exit. May 10 00:44:37.626594 systemd-logind[1191]: Removed session 24. May 10 00:44:37.627570 kernel: audit: type=1106 audit(1746837877.620:1511): pid=5059 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.627645 kernel: audit: type=1104 audit(1746837877.620:1512): pid=5059 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.620000 audit[5059]: CRED_DISP pid=5059 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:37.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.88:22-10.0.0.1:50286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:42.625483 systemd[1]: Started sshd@24-10.0.0.88:22-10.0.0.1:50302.service. May 10 00:44:42.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.88:22-10.0.0.1:50302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:42.626788 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:44:42.626851 kernel: audit: type=1130 audit(1746837882.624:1514): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.88:22-10.0.0.1:50302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:42.660000 audit[5075]: USER_ACCT pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:42.662438 sshd[5075]: Accepted publickey for core from 10.0.0.1 port 50302 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:44:42.663903 sshd[5075]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:42.662000 audit[5075]: CRED_ACQ pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:42.667715 systemd-logind[1191]: New session 25 of user core. May 10 00:44:42.668764 systemd[1]: Started session-25.scope. May 10 00:44:42.671220 kernel: audit: type=1101 audit(1746837882.660:1515): pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:42.671273 kernel: audit: type=1103 audit(1746837882.662:1516): pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:42.671313 kernel: audit: type=1006 audit(1746837882.662:1517): pid=5075 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 10 00:44:42.674110 kernel: audit: type=1300 audit(1746837882.662:1517): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe4d5e5e0 a2=3 a3=0 items=0 ppid=1 pid=5075 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:42.662000 audit[5075]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe4d5e5e0 a2=3 a3=0 items=0 ppid=1 pid=5075 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:42.678389 kernel: audit: type=1327 audit(1746837882.662:1517): proctitle=737368643A20636F7265205B707269765D May 10 00:44:42.662000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:42.671000 audit[5075]: USER_START pid=5075 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:42.684088 kernel: audit: type=1105 audit(1746837882.671:1518): pid=5075 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:42.684126 kernel: audit: type=1103 audit(1746837882.673:1519): pid=5077 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:42.673000 audit[5077]: CRED_ACQ pid=5077 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:42.786453 sshd[5075]: pam_unix(sshd:session): session closed for user core May 10 00:44:42.786000 audit[5075]: USER_END pid=5075 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:42.789201 systemd[1]: sshd@24-10.0.0.88:22-10.0.0.1:50302.service: Deactivated successfully. May 10 00:44:42.790183 systemd[1]: session-25.scope: Deactivated successfully. May 10 00:44:42.791175 systemd-logind[1191]: Session 25 logged out. Waiting for processes to exit. May 10 00:44:42.792037 systemd-logind[1191]: Removed session 25. May 10 00:44:42.786000 audit[5075]: CRED_DISP pid=5075 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:42.796036 kernel: audit: type=1106 audit(1746837882.786:1520): pid=5075 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:42.796089 kernel: audit: type=1104 audit(1746837882.786:1521): pid=5075 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:42.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.88:22-10.0.0.1:50302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:47.742404 kubelet[1947]: E0510 00:44:47.742347 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 10 00:44:47.793431 systemd[1]: Started sshd@25-10.0.0.88:22-10.0.0.1:38800.service. May 10 00:44:47.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.88:22-10.0.0.1:38800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:47.794771 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:44:47.794837 kernel: audit: type=1130 audit(1746837887.792:1523): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.88:22-10.0.0.1:38800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:47.838000 audit[5088]: USER_ACCT pid=5088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:47.840461 sshd[5088]: Accepted publickey for core from 10.0.0.1 port 38800 ssh2: RSA SHA256:YPfNqeDLVNRLKHCWIqCEBm90yIBoYAoMePhSYn7FUn0 May 10 00:44:47.845306 sshd[5088]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:47.845610 kernel: audit: type=1101 audit(1746837887.838:1524): pid=5088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:47.845651 kernel: audit: type=1103 audit(1746837887.843:1525): pid=5088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:47.843000 audit[5088]: CRED_ACQ pid=5088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:47.851347 systemd-logind[1191]: New session 26 of user core. May 10 00:44:47.852225 systemd[1]: Started session-26.scope. May 10 00:44:47.852747 kernel: audit: type=1006 audit(1746837887.843:1526): pid=5088 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 10 00:44:47.843000 audit[5088]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc386c3080 a2=3 a3=0 items=0 ppid=1 pid=5088 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:47.857498 kernel: audit: type=1300 audit(1746837887.843:1526): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc386c3080 a2=3 a3=0 items=0 ppid=1 pid=5088 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:47.857586 kernel: audit: type=1327 audit(1746837887.843:1526): proctitle=737368643A20636F7265205B707269765D May 10 00:44:47.843000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:47.856000 audit[5088]: USER_START pid=5088 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:47.864905 kernel: audit: type=1105 audit(1746837887.856:1527): pid=5088 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:47.864984 kernel: audit: type=1103 audit(1746837887.858:1528): pid=5090 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:47.858000 audit[5090]: CRED_ACQ pid=5090 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:48.048642 sshd[5088]: pam_unix(sshd:session): session closed for user core May 10 00:44:48.048000 audit[5088]: USER_END pid=5088 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:48.051709 systemd[1]: sshd@25-10.0.0.88:22-10.0.0.1:38800.service: Deactivated successfully. May 10 00:44:48.052570 systemd[1]: session-26.scope: Deactivated successfully. May 10 00:44:48.053868 systemd-logind[1191]: Session 26 logged out. Waiting for processes to exit. May 10 00:44:48.055132 systemd-logind[1191]: Removed session 26. May 10 00:44:48.048000 audit[5088]: CRED_DISP pid=5088 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:48.060538 kernel: audit: type=1106 audit(1746837888.048:1529): pid=5088 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:48.060690 kernel: audit: type=1104 audit(1746837888.048:1530): pid=5088 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 10 00:44:48.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.88:22-10.0.0.1:38800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'